Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
30367dd2349f59eb501d9c5a5e1eff0ca5e7a2068bfbc769407da3e7fd859f73.dll
Resource
win7-20240705-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
30367dd2349f59eb501d9c5a5e1eff0ca5e7a2068bfbc769407da3e7fd859f73.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
30367dd2349f59eb501d9c5a5e1eff0ca5e7a2068bfbc769407da3e7fd859f73.dll
-
Size
2.0MB
-
MD5
8897e35d1caa68e3b05513ce01ade8d2
-
SHA1
4b9648ca46fceb18e45247ca17bf8a57822ac2b4
-
SHA256
30367dd2349f59eb501d9c5a5e1eff0ca5e7a2068bfbc769407da3e7fd859f73
-
SHA512
78b9b4f062e85f2eb3d1f35ff8310bab77410dbd7acfb8b6fee55d342d58fe46d6983332aab765b8ff0881b2938411e33ccdaaee52ad3e6d9279be226122c7f9
-
SSDEEP
49152:NidGTnGpgHPqA4vy1WDM0CEzoTNUitBNOLQJ:NidSGVAN1WD9HL6
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4532 wrote to memory of 1508 4532 rundll32.exe 84 PID 4532 wrote to memory of 1508 4532 rundll32.exe 84 PID 4532 wrote to memory of 1508 4532 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30367dd2349f59eb501d9c5a5e1eff0ca5e7a2068bfbc769407da3e7fd859f73.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30367dd2349f59eb501d9c5a5e1eff0ca5e7a2068bfbc769407da3e7fd859f73.dll,#12⤵PID:1508
-