Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 00:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bb63edd4b84a99921dd864785609cdf14977a83bdcf3082fe585e87cf0444556.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
bb63edd4b84a99921dd864785609cdf14977a83bdcf3082fe585e87cf0444556.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
bb63edd4b84a99921dd864785609cdf14977a83bdcf3082fe585e87cf0444556.dll
-
Size
3KB
-
MD5
db263c399c88f3a1cc4aac481f5455ae
-
SHA1
a1c37f29fd92088ba83d062d5fa4a1609d80311b
-
SHA256
bb63edd4b84a99921dd864785609cdf14977a83bdcf3082fe585e87cf0444556
-
SHA512
04cfb5f4464054798ed69ba0a86f90d7c6dae3499030ee800933fbe4df5e2056c863041374b83f06f98c622a7bcb9e4274fd22adbe6f8e5a2b0ed22e0ce83981
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3360 wrote to memory of 1864 3360 rundll32.exe 84 PID 3360 wrote to memory of 1864 3360 rundll32.exe 84 PID 3360 wrote to memory of 1864 3360 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb63edd4b84a99921dd864785609cdf14977a83bdcf3082fe585e87cf0444556.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb63edd4b84a99921dd864785609cdf14977a83bdcf3082fe585e87cf0444556.dll,#12⤵PID:1864
-