Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 23:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c2fa3165083f90cd7c0c2d2a617fd073.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c2fa3165083f90cd7c0c2d2a617fd073.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c2fa3165083f90cd7c0c2d2a617fd073.dll
-
Size
3KB
-
MD5
c2fa3165083f90cd7c0c2d2a617fd073
-
SHA1
b1ebb67f54fa738dec36e27bef285d3e51947eea
-
SHA256
3c3e3b2e0cc89e5dcd619b9861b62083053e71038486aa6e9fc45d1d986d24ac
-
SHA512
fc5096e9804b5ba36506a95d610f804d1f2101155e36a283dc1dc9b6d2ab14fb64c02472d87d0523c30d78d736f2ea65869a51c22e04f36c9f134eab955a955b
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 3884 4908 rundll32.exe 84 PID 4908 wrote to memory of 3884 4908 rundll32.exe 84 PID 4908 wrote to memory of 3884 4908 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2fa3165083f90cd7c0c2d2a617fd073.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2fa3165083f90cd7c0c2d2a617fd073.dll,#12⤵PID:3884
-