Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
880cdd855ccbc411c3b41112316042b12c8a644682e00d46163e25a95e2e76fe.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
880cdd855ccbc411c3b41112316042b12c8a644682e00d46163e25a95e2e76fe.dll
Resource
win10v2004-20231215-en
General
-
Target
880cdd855ccbc411c3b41112316042b12c8a644682e00d46163e25a95e2e76fe.dll
-
Size
5.5MB
-
MD5
f6e9b380373f7de5af108fb8492d4400
-
SHA1
3f00d0d7b89260162b7b5436c14c7f71398a5c3d
-
SHA256
880cdd855ccbc411c3b41112316042b12c8a644682e00d46163e25a95e2e76fe
-
SHA512
1484585469f6066acf7644d0482307a14eeae29fdb09f087886c6b6e5fce6250c78d641037838d8e4bf7da4175195a1b00f435d3bde6f9a0d93d5c06b1cb02b7
-
SSDEEP
98304:KH8gc0tXT2p8ixrKyZxu9NV/NXtWJ9Cw+hU1UZLOtxNq5:KNc0528ZyZM9HNdWTVe5ixO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 4904 412 rundll32.exe 87 PID 412 wrote to memory of 4904 412 rundll32.exe 87 PID 412 wrote to memory of 4904 412 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\880cdd855ccbc411c3b41112316042b12c8a644682e00d46163e25a95e2e76fe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\880cdd855ccbc411c3b41112316042b12c8a644682e00d46163e25a95e2e76fe.dll,#12⤵PID:4904
-