Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 19:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1532de8f229c584ec1859ffd7ad2e715792fa542e9115ec82ee50c7e69a1c308.dll
Resource
win7-20240220-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1532de8f229c584ec1859ffd7ad2e715792fa542e9115ec82ee50c7e69a1c308.dll
Resource
win10v2004-20240704-en
1 signatures
150 seconds
General
-
Target
1532de8f229c584ec1859ffd7ad2e715792fa542e9115ec82ee50c7e69a1c308.dll
-
Size
34KB
-
MD5
7385832ac8719c67d99297f30748c1fa
-
SHA1
dad0336f0c9370577952b55859ce21ba05b9d1ce
-
SHA256
1532de8f229c584ec1859ffd7ad2e715792fa542e9115ec82ee50c7e69a1c308
-
SHA512
e52915f9a3bfa049ba3a45be95e33443f512dc5eeacf8dcee08379f088f07067433195821bcc078918042509c76d8ca3cdf6136e3e545cad700563308724a065
-
SSDEEP
96:Izuo08ZWVv7jQkIqBz5H7y0ilsFrZHvvYrO:I3PWVDj7Y/+VZ3YrO
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1968 wrote to memory of 4968 1968 rundll32.exe 82 PID 1968 wrote to memory of 4968 1968 rundll32.exe 82 PID 1968 wrote to memory of 4968 1968 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1532de8f229c584ec1859ffd7ad2e715792fa542e9115ec82ee50c7e69a1c308.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1532de8f229c584ec1859ffd7ad2e715792fa542e9115ec82ee50c7e69a1c308.dll,#12⤵PID:4968
-