Analysis
-
max time kernel
114s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
8b2df72b21405e2e5049b37432007a83b93c594c58fdae451c937532272bf559.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b2df72b21405e2e5049b37432007a83b93c594c58fdae451c937532272bf559.dll
Resource
win10v2004-20231215-en
General
-
Target
8b2df72b21405e2e5049b37432007a83b93c594c58fdae451c937532272bf559.dll
-
Size
1.9MB
-
MD5
4c49bda48ca0ded1f2e7f243e12f52ca
-
SHA1
709ff503ff993fde7694b14d7179be7f68bb4d5b
-
SHA256
8b2df72b21405e2e5049b37432007a83b93c594c58fdae451c937532272bf559
-
SHA512
9aaf22d15647ee469df0232ef65fedc5aa15718bda25bf2f203256563d74799cb5a22991de0edbde505e1e2331e0c74b146130e70c49d96697e961d8c2b9006a
-
SSDEEP
24576:Avl44JsKa84o9UJax/VMZEiNU3AirwtL29aTB59GwuCoLRqrEH7H:t4JCw9UJax/Sq3AiuMaTB59GwuTT
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4848 4752 rundll32.exe 12 PID 4752 wrote to memory of 4848 4752 rundll32.exe 12 PID 4752 wrote to memory of 4848 4752 rundll32.exe 12
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b2df72b21405e2e5049b37432007a83b93c594c58fdae451c937532272bf559.dll,#11⤵PID:4848
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b2df72b21405e2e5049b37432007a83b93c594c58fdae451c937532272bf559.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4752