Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 01:57
Behavioral task
behavioral1
Sample
52c67ec21477bc99946a6beb325544f173f8d53482cdaa48a43479751ca72007.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
52c67ec21477bc99946a6beb325544f173f8d53482cdaa48a43479751ca72007.dll
Resource
win10v2004-20240226-en
General
-
Target
52c67ec21477bc99946a6beb325544f173f8d53482cdaa48a43479751ca72007.dll
-
Size
520KB
-
MD5
789e9ca0cf761fc700375be8df1e76ac
-
SHA1
21d51e9d649f8cfe50d57617ed78b260ae1d2542
-
SHA256
52c67ec21477bc99946a6beb325544f173f8d53482cdaa48a43479751ca72007
-
SHA512
ad9355c7c15a4c7191e31a2d59197d9961b833d3b87aeb528d5a5336315bcf3f6df6e976911b781953adf15afc251fd7d169c310608348bb5ab628361cb46bd3
-
SSDEEP
6144:ATVIxIMbqmIVOCykm5vRINGQNN12yargJQjQzHHpTbKjYg3d0u9EToiXCYeUCZKZ:kVIx1wykYRIz3cgOMbpT+H3ddbdpZh
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 15 3332 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 948 wrote to memory of 3332 948 rundll32.exe 89 PID 948 wrote to memory of 3332 948 rundll32.exe 89 PID 948 wrote to memory of 3332 948 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52c67ec21477bc99946a6beb325544f173f8d53482cdaa48a43479751ca72007.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52c67ec21477bc99946a6beb325544f173f8d53482cdaa48a43479751ca72007.dll,#12⤵
- Blocklisted process makes network request
PID:3332
-