Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
d6e7ada31586194ee57cd0b5a0eb05ad7c51ece845fa6106796b51b875fe8f0b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d6e7ada31586194ee57cd0b5a0eb05ad7c51ece845fa6106796b51b875fe8f0b.dll
Resource
win10v2004-20231215-en
General
-
Target
d6e7ada31586194ee57cd0b5a0eb05ad7c51ece845fa6106796b51b875fe8f0b.dll
-
Size
1.5MB
-
MD5
8206815a86185762bb6d7882df4216fd
-
SHA1
09fea5d0b61840d639f97636972625c2e868bcdd
-
SHA256
d6e7ada31586194ee57cd0b5a0eb05ad7c51ece845fa6106796b51b875fe8f0b
-
SHA512
0ae8c7ead42651cee0d2d932b5da7fde21ad9249659101958b325d32aa11d4aab1f1b225ec20e66f0d06d254d54c3fba205e5f62afeff2e51842eb5c7c3a76ed
-
SSDEEP
24576:dXassrmKxr0cYENaE8SOmui7tj4O6osXve3f05a1/8Rbpb/dTDIucwXzV1NrEH7h:dqrVtZNargui7tj4O5smYa1Mbpb/dTEn
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3628 wrote to memory of 112 3628 rundll32.exe 86 PID 3628 wrote to memory of 112 3628 rundll32.exe 86 PID 3628 wrote to memory of 112 3628 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6e7ada31586194ee57cd0b5a0eb05ad7c51ece845fa6106796b51b875fe8f0b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6e7ada31586194ee57cd0b5a0eb05ad7c51ece845fa6106796b51b875fe8f0b.dll,#12⤵PID:112
-