Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 23:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a6e8d320323e6b1a4123d12914bbd73c5d06f5d4110aed695071a86476d5f304.dll
Resource
win7-20231129-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a6e8d320323e6b1a4123d12914bbd73c5d06f5d4110aed695071a86476d5f304.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a6e8d320323e6b1a4123d12914bbd73c5d06f5d4110aed695071a86476d5f304.dll
-
Size
7KB
-
MD5
89dcdb3906a4a618c00aeab2e1438737
-
SHA1
5f6d849c9f5683752885ed33d3f8c8e4d1955647
-
SHA256
a6e8d320323e6b1a4123d12914bbd73c5d06f5d4110aed695071a86476d5f304
-
SHA512
6f0356f6549d218db8fff3d7541a1ce3b008fb9d456010fe9f31af5e62b36e683e3ba55c16d7a278f05668ee02662eccd0aded6c8cad0231c010d33db54d02af
-
SSDEEP
96:wb4VHccYJUC/aFbz/j0OvaPCd3cX5aXW:wUaJf/aFbP0O52JaX
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2152 wrote to memory of 3168 2152 rundll32.exe 85 PID 2152 wrote to memory of 3168 2152 rundll32.exe 85 PID 2152 wrote to memory of 3168 2152 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6e8d320323e6b1a4123d12914bbd73c5d06f5d4110aed695071a86476d5f304.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6e8d320323e6b1a4123d12914bbd73c5d06f5d4110aed695071a86476d5f304.dll,#12⤵PID:3168
-