Analysis
-
max time kernel
139s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 04:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f0e7063c002be4a61795e5214ececb49b04d4f325ab83a27138d32dd46023ce0.dll
Resource
win7-20240508-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
f0e7063c002be4a61795e5214ececb49b04d4f325ab83a27138d32dd46023ce0.dll
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
f0e7063c002be4a61795e5214ececb49b04d4f325ab83a27138d32dd46023ce0.dll
-
Size
110KB
-
MD5
1cbeb5748780f406a3040d50ed265840
-
SHA1
0b9d5d93f23db099a483a3ad3d464163141ab98f
-
SHA256
f0e7063c002be4a61795e5214ececb49b04d4f325ab83a27138d32dd46023ce0
-
SHA512
7bacb7675ac5911eaa235bf4bf6c60cd0c296fd4f521cc3c9d97df26a8283eadcd3417711b7d5002b52712fde0ac5c19e2d209eeb0c6036142ff663f45a1ee7f
-
SSDEEP
3072:hHzxut/Uav1Mgmy73P9AiF7PG4+lanj/FwYRM:GtM61D7YajFwYRM
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1280 2196 rundll32.exe 83 PID 2196 wrote to memory of 1280 2196 rundll32.exe 83 PID 2196 wrote to memory of 1280 2196 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f0e7063c002be4a61795e5214ececb49b04d4f325ab83a27138d32dd46023ce0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f0e7063c002be4a61795e5214ececb49b04d4f325ab83a27138d32dd46023ce0.dll,#12⤵PID:1280
-