Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 00:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8dc1cd4438422ba2fb7e6f5fee8cfaae.dll
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
8dc1cd4438422ba2fb7e6f5fee8cfaae.dll
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
8dc1cd4438422ba2fb7e6f5fee8cfaae.dll
-
Size
184KB
-
MD5
8dc1cd4438422ba2fb7e6f5fee8cfaae
-
SHA1
7155a35d7f77e524eab57dcc5a3daee49859e140
-
SHA256
2ae669bfe8aa8b05477ce96e56bc22354a042a592966308f7ec1e11db860e342
-
SHA512
a00907793d44700510a6b36077a599b2383f5a95bd978e001026223e32891d5c18000eec4be2633302087bb9263a2bc4ffd14b3a06ec556eaea3aad6a1d7a9c9
-
SSDEEP
1536:vaIHIJkuvfZ/AuwZBy2xDoSLVYOzi32v+JAIRprTL4InjPn2HlNySsn42tStI9Sn:ykyxvfGZUSx3eSIRprQun42tkI97g
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 116 wrote to memory of 4084 116 rundll32.exe 84 PID 116 wrote to memory of 4084 116 rundll32.exe 84 PID 116 wrote to memory of 4084 116 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8dc1cd4438422ba2fb7e6f5fee8cfaae.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8dc1cd4438422ba2fb7e6f5fee8cfaae.dll,#12⤵PID:4084
-