Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 19:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2d0387017cc0127e03386adf68823e1a18aae76f1c11d9a1a38d530f60d5a950.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d0387017cc0127e03386adf68823e1a18aae76f1c11d9a1a38d530f60d5a950.dll
Resource
win10v2004-20240412-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
2d0387017cc0127e03386adf68823e1a18aae76f1c11d9a1a38d530f60d5a950.dll
-
Size
6KB
-
MD5
adaad0605f05a3167d7a2c22bd38fac6
-
SHA1
48f78ca40db1b0e1835494f4c39e0ab37dbc0a19
-
SHA256
2d0387017cc0127e03386adf68823e1a18aae76f1c11d9a1a38d530f60d5a950
-
SHA512
7a66227912197584e994a4d841a115986042e96f3fefdbc136c9873cfd26c982489f6f992962e4a19565a472cdbf8868f18da2bd7f9069178d5f33b1b75cd3e2
-
SSDEEP
192:F5oLX+vF+sOM7Yyb7GkaKuY+498v+FSk:F5mX+vuM7YyvGDKuYf8v+
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4216 4852 rundll32.exe 84 PID 4852 wrote to memory of 4216 4852 rundll32.exe 84 PID 4852 wrote to memory of 4216 4852 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d0387017cc0127e03386adf68823e1a18aae76f1c11d9a1a38d530f60d5a950.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d0387017cc0127e03386adf68823e1a18aae76f1c11d9a1a38d530f60d5a950.dll,#12⤵PID:4216
-