Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 14:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
04e0879f2375dad1e008c2f7fb0873e0N.dll
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
04e0879f2375dad1e008c2f7fb0873e0N.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
04e0879f2375dad1e008c2f7fb0873e0N.dll
-
Size
156KB
-
MD5
04e0879f2375dad1e008c2f7fb0873e0
-
SHA1
8cc5d78111a196e57064bdb0fee964c48f5b98ce
-
SHA256
d57e687edc4c24fdadbf7c07c5e6369efeb3dbb8757132d2a92752739c6dfbe4
-
SHA512
f1a15ad20403b5835437f1f9ce266872a3e1d85170409ba424a1d60909aeae3d506ddba5bc073b26e4277e4b611c27247a675ab2929fc68713efd8989231b072
-
SSDEEP
3072:TIqkRbS0sUfN9qYCmo9KihpVbuIiXBJ+fcSP6qYq:Ydr/ihpVW+x6qY
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4348 wrote to memory of 4460 4348 rundll32.exe 83 PID 4348 wrote to memory of 4460 4348 rundll32.exe 83 PID 4348 wrote to memory of 4460 4348 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04e0879f2375dad1e008c2f7fb0873e0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04e0879f2375dad1e008c2f7fb0873e0N.dll,#12⤵PID:4460
-