Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 05:34
Behavioral task
behavioral1
Sample
add07306c2b6d60634f55184eb7adf45.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
add07306c2b6d60634f55184eb7adf45.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
add07306c2b6d60634f55184eb7adf45.dll
-
Size
110KB
-
MD5
add07306c2b6d60634f55184eb7adf45
-
SHA1
99b51051da0c8b9debce0f6a391d2b0da353750f
-
SHA256
e1b66fe3d96d6eecdb3e6167d94bf9d31cc10c3b82ae03a0100c73ec957d7395
-
SHA512
f84c717d87ea813aeddc6ef3868567ad686c20a8ff53aa3961d22a76331b5fd4e0493c9d2209080186b516bcc7ee335a341dd30ec7a04d1c352c646b3cdcad79
-
SSDEEP
1536:vZAqy2k5gHxxZEdscpg4/G23D1iovBMZTI2TIwIZA0FdxdoE:hAq0gHxxSdHg4/NDMoZMZTI2T0S0Ft
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3760 wrote to memory of 1432 3760 rundll32.exe 59 PID 3760 wrote to memory of 1432 3760 rundll32.exe 59 PID 3760 wrote to memory of 1432 3760 rundll32.exe 59
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\add07306c2b6d60634f55184eb7adf45.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\add07306c2b6d60634f55184eb7adf45.dll,#12⤵PID:1432
-