Analysis
-
max time kernel
93s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 23:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a72ad7ca1dab34a1cf2ff66537b01703.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a72ad7ca1dab34a1cf2ff66537b01703.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a72ad7ca1dab34a1cf2ff66537b01703.dll
-
Size
3KB
-
MD5
a72ad7ca1dab34a1cf2ff66537b01703
-
SHA1
0f48e0b7636bc4f618f7381242dfde4cf6579847
-
SHA256
e82bd78c32db0dc8eef74323dded59c45a508e8356d31c67c519d8717a302531
-
SHA512
4ddc4c50688618868ee5c345b303ad6c0236b5e5de8bb6bfad651a422ddd260def46df5260e405d6e51ae6aed772f145c16fc6c8e9e5354c986d58233ac99a71
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 5064 2252 rundll32.exe 84 PID 2252 wrote to memory of 5064 2252 rundll32.exe 84 PID 2252 wrote to memory of 5064 2252 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a72ad7ca1dab34a1cf2ff66537b01703.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a72ad7ca1dab34a1cf2ff66537b01703.dll,#12⤵PID:5064
-