Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 16:52
Behavioral task
behavioral1
Sample
cbedc1d1ec22ddae21cce3ac3f3c9969.dll
Resource
win7-20240215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
cbedc1d1ec22ddae21cce3ac3f3c9969.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
cbedc1d1ec22ddae21cce3ac3f3c9969.dll
-
Size
244KB
-
MD5
cbedc1d1ec22ddae21cce3ac3f3c9969
-
SHA1
5b155107aff8683eba1b9e5d618dfa9ea2866281
-
SHA256
859fd4db26b191c3de62c12f22f311bc0778cbf20c1deaf71154e31023b86e41
-
SHA512
b7ec6e72750c9eb8996b68a9829cda3ef687263ec63a31a5845fe1cfbc850cc8e26a41b16cbabc5394ed6d02ddb8539abb40d0bd8bc2a7f9409d828bc5821de4
-
SSDEEP
6144:LmN/wQuTH/v7iO2+CrRCR/PCI2FoWRJCNT:LmN/buACR/hWRJCl
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 560 wrote to memory of 4708 560 rundll32.exe 90 PID 560 wrote to memory of 4708 560 rundll32.exe 90 PID 560 wrote to memory of 4708 560 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbedc1d1ec22ddae21cce3ac3f3c9969.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbedc1d1ec22ddae21cce3ac3f3c9969.dll,#12⤵PID:4708
-