Analysis
-
max time kernel
93s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
db814a92870cb751fa23294a8d96dd8c893493a76ca08d805144b6cf62aca282.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
db814a92870cb751fa23294a8d96dd8c893493a76ca08d805144b6cf62aca282.dll
Resource
win10v2004-20240221-en
General
-
Target
db814a92870cb751fa23294a8d96dd8c893493a76ca08d805144b6cf62aca282.dll
-
Size
698KB
-
MD5
0b2ddce4b5f40da59320084e67a19217
-
SHA1
2b3979bd895c5fcdf05b5fe97413947580b25756
-
SHA256
db814a92870cb751fa23294a8d96dd8c893493a76ca08d805144b6cf62aca282
-
SHA512
5214295d39c46acc57db1934cd5365f269cfecf7415036f5ca13313b40599a7177f7db60ea32f26320fdda1a7c3d522d92c2ef38b14aa50379d9f024204afe8b
-
SSDEEP
12288:vZFA9R+S26360+0wzFZlBlYo9Y6wYGobE0+rtzClzU/c9QhoYZ:vZO9R+u60Ivl3e6wUbp+hzGYJoYZ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4072 wrote to memory of 1824 4072 rundll32.exe 85 PID 4072 wrote to memory of 1824 4072 rundll32.exe 85 PID 4072 wrote to memory of 1824 4072 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db814a92870cb751fa23294a8d96dd8c893493a76ca08d805144b6cf62aca282.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db814a92870cb751fa23294a8d96dd8c893493a76ca08d805144b6cf62aca282.dll,#12⤵PID:1824
-