Analysis
-
max time kernel
145s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
24c802a366b3780a4d9745a900b69a4bc8d2c8702a03a8c11bf17997c0db7eaf.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24c802a366b3780a4d9745a900b69a4bc8d2c8702a03a8c11bf17997c0db7eaf.dll
Resource
win10v2004-20240226-en
General
-
Target
24c802a366b3780a4d9745a900b69a4bc8d2c8702a03a8c11bf17997c0db7eaf.dll
-
Size
623KB
-
MD5
b820ca941ae4e895d4e172de1605a1fd
-
SHA1
9cc11f8fb0155dcdfe3598d3167825983d4ccdda
-
SHA256
24c802a366b3780a4d9745a900b69a4bc8d2c8702a03a8c11bf17997c0db7eaf
-
SHA512
4c7c2809c2603e4ae4fe572165fa26f6a43af5d8d17ecd98972a55cf2aac77986c7703abbfd59ed86f86639c61badca7de30a7cfa9fd239ed7b595cbbadc9d75
-
SSDEEP
12288:imkSnRikoRDegfDybtFDpJHqNMHBz2W5z02XNv3DfyZqp7oZTOQJ:iHm+ybfD7HqmBztz/R3uZfZqQJ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4192 4656 rundll32.exe 88 PID 4656 wrote to memory of 4192 4656 rundll32.exe 88 PID 4656 wrote to memory of 4192 4656 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24c802a366b3780a4d9745a900b69a4bc8d2c8702a03a8c11bf17997c0db7eaf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24c802a366b3780a4d9745a900b69a4bc8d2c8702a03a8c11bf17997c0db7eaf.dll,#12⤵PID:4192
-