Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Dec. 14, 2022, 1:26 p.m. | Dec. 14, 2022, 1:28 p.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\tempresource.tmp.dll,mydllmain
2556-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\tempresource.tmp.dll,mydllmain
2704
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\tempresource.tmp.dll,
2644
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\Users\win10\source\repos\SysLoaderDll2Sandbox\x64\Debug\SysLoaderDll2Sandbox.pdb |
section | .textbss |
section | .msvcjmc |
section | .00cfg |
packer | Microsoft Visual C++ V8.0 (Debug) |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.2bdb5acc4e988fd0 |
CrowdStrike | win/malicious_confidence_90% (D) |
Sophos | Generic ML PUA (PUA) |
Cynet | Malicious (score: 100) |
section | {u'size_of_data': u'0x00051400', u'virtual_address': u'0x0001f000', u'entropy': 6.907080486194268, u'name': u'.data', u'virtual_size': u'0x000540f8'} | entropy | 6.90708048619 | description | A section with a high entropy has been found | |||||||||
entropy | 0.831202046036 | description | Overall entropy of this PE file is high |