Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 13:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0160469d5a1d547fbaa061fac743cc10N.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0160469d5a1d547fbaa061fac743cc10N.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
0160469d5a1d547fbaa061fac743cc10N.dll
-
Size
5KB
-
MD5
0160469d5a1d547fbaa061fac743cc10
-
SHA1
82ccde1f7293134b9f4d7a839aa74859e2c4a442
-
SHA256
f0f4b16c8b158a0f12a15f0bc9020f275ac85955052ede8b95cdf102e1f0c09e
-
SHA512
41f09ad45ef902dbdf3d33515810ec2139fb00a5752ca9a8a37f23e3f11be5af1f1d7c67945a0bf6777eda8363cf53dffa93cede17861eea9c8675599e17000c
-
SSDEEP
96:nEY2RrF1eqwi4doHvp+XXFkoelbR4iYuq77CWTv:EHRh1eppcKFtelFTYuq7uWT
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4584 wrote to memory of 1180 4584 rundll32.exe 84 PID 4584 wrote to memory of 1180 4584 rundll32.exe 84 PID 4584 wrote to memory of 1180 4584 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0160469d5a1d547fbaa061fac743cc10N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0160469d5a1d547fbaa061fac743cc10N.dll,#12⤵PID:1180
-