Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 08:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ae54b889a71d3b090b53be5ab091a1c0N.dll
Resource
win10v2004-20240709-en
1 signatures
120 seconds
General
-
Target
ae54b889a71d3b090b53be5ab091a1c0N.dll
-
Size
802KB
-
MD5
ae54b889a71d3b090b53be5ab091a1c0
-
SHA1
deaeeea7a8cbfebb9ff84cbb1beb0ee7df27daa1
-
SHA256
178ff40c7982dabf804470b58c334a862adf254b55518f88b60c881920b42391
-
SHA512
fdd2f5da95b45b99763af9c40380f9ad566b64f83f9cadb0c9b8c75e04a449cddd021542c3aaf6728d678d8138e5d3d498ab9e61e503e17cacea30e652825854
-
SSDEEP
12288:SdqHZQ4YUoGf+bwSMBWyGapsFc2PFMyVuOqbw/l3c:hHZtYUoGf8wJBWDapslPg8lM
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3164 wrote to memory of 4460 3164 rundll32.exe 83 PID 3164 wrote to memory of 4460 3164 rundll32.exe 83 PID 3164 wrote to memory of 4460 3164 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae54b889a71d3b090b53be5ab091a1c0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae54b889a71d3b090b53be5ab091a1c0N.dll,#12⤵PID:4460
-