Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
0259316ce197d74829b9158c22b051673db63ece0e4b45df32a41fcbb3918c87.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0259316ce197d74829b9158c22b051673db63ece0e4b45df32a41fcbb3918c87.dll
Resource
win10v2004-20240226-en
General
-
Target
0259316ce197d74829b9158c22b051673db63ece0e4b45df32a41fcbb3918c87.dll
-
Size
148KB
-
MD5
570547fa75c15e6eb9e651f2a2ee0749
-
SHA1
f20d9c3d2e3fb891fe5ae4b656bdc50a87f2707f
-
SHA256
0259316ce197d74829b9158c22b051673db63ece0e4b45df32a41fcbb3918c87
-
SHA512
8043ca9d566c0c03c9a2779710cad7d542e16dabf9a13d2e61c22ac288d2a204561f1ddb1ad80b6b31c0af1e68b681a58f7fb3d8aa0015876537a91d58c670e9
-
SSDEEP
3072:HnJvHI9R9qmjHh/yAyKnLjhadSIVs8RQq8qkHIBnREDKLWB8tB5blZp:d4R9qmjVylKfhadSgxp+7B8tB5bXp
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4568 rundll32.exe 4568 rundll32.exe 4568 rundll32.exe 4568 rundll32.exe 4568 rundll32.exe 4568 rundll32.exe 4568 rundll32.exe 4568 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 552 wrote to memory of 4568 552 rundll32.exe 89 PID 552 wrote to memory of 4568 552 rundll32.exe 89 PID 552 wrote to memory of 4568 552 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0259316ce197d74829b9158c22b051673db63ece0e4b45df32a41fcbb3918c87.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0259316ce197d74829b9158c22b051673db63ece0e4b45df32a41fcbb3918c87.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-