Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 05:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
72b6e6db1221cb5beb2146b476f864b0N.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
1 signatures
120 seconds
General
-
Target
72b6e6db1221cb5beb2146b476f864b0N.dll
-
Size
245KB
-
MD5
72b6e6db1221cb5beb2146b476f864b0
-
SHA1
e3e478861d55ba0a7d24a1b9938cdfc6bb82449f
-
SHA256
235433fc1681765d0c017c4951f2895f2d94fbb1fed6eba268389968b1fb2da1
-
SHA512
3bfe8597bfbf22e944bb51d61d050b6306a11373de1eb7558894fc7b938d74c40bb785c6a31252abcda833193e0a8d6f317d913991594ce328ba7c8c2cc6d48b
-
SSDEEP
3072:M8/obVTvm38pUQqSXhi+6Sio/wi9M4lVXRbSslG425HYCmohrihpAfsITXBJiSc9:M8qTvrpUQBhiHm/A4R3MbihpAhiJ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4980 wrote to memory of 5072 4980 rundll32.exe 84 PID 4980 wrote to memory of 5072 4980 rundll32.exe 84 PID 4980 wrote to memory of 5072 4980 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72b6e6db1221cb5beb2146b476f864b0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72b6e6db1221cb5beb2146b476f864b0N.dll,#12⤵PID:5072
-