Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c.dll
Resource
win10v2004-20240220-en
General
-
Target
312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c.dll
-
Size
187KB
-
MD5
6160dde73e3613b7b24b6300f180d0bf
-
SHA1
d4745b0efdd0a25af81606e6212c772212061f68
-
SHA256
312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c
-
SHA512
f9b9005e880096c1454f9d6c14d9c0f72b7496648ea6cda1b140e4abfea4273c7b22665b1ffc6e48a9d24a9b591f782ed423e834738fe99216f533700b5b9aeb
-
SSDEEP
3072:fFYHf3/BnZSQ/Y7zJAW3mOKWa84x6BMyblflFj2lQBV+UdE+rECWp7hKSjC:fF0ffYdTmOK8S6BMyxddBV+UdvrEFp7k
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 724 wrote to memory of 4832 724 rundll32.exe 84 PID 724 wrote to memory of 4832 724 rundll32.exe 84 PID 724 wrote to memory of 4832 724 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\312242903f0f6f1dee23a6b6f4fb6d7ff179939983556b9ad6621af44bfb2b0c.dll,#12⤵PID:4832
-