Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
3d6502b60655e350ca1a3d36962e84a8b0187175d74d669812835b22737e8760.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
3d6502b60655e350ca1a3d36962e84a8b0187175d74d669812835b22737e8760.dll
Resource
win10v2004-20240226-en
General
-
Target
3d6502b60655e350ca1a3d36962e84a8b0187175d74d669812835b22737e8760.dll
-
Size
502KB
-
MD5
f4a1ddd9912ae798ee221fa7936f79e4
-
SHA1
220b2fb2d141e91490ac78dd706fd877e9e2a75c
-
SHA256
3d6502b60655e350ca1a3d36962e84a8b0187175d74d669812835b22737e8760
-
SHA512
48e0be2b5680039860aa0d7ccd02b6e1951a8bad8efab8331d01ed8d43f01ec5f0f841bdeba88b66e8c745cd7531f67a7d5fcf50d47ef79120309bd5d1de1654
-
SSDEEP
12288:n4xuOzRrQqATQd66XUYrJHK5OXPGwBsDNY:n4xuONQJL6XDq5OXPGwBCY
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1344 wrote to memory of 4140 1344 rundll32.exe 89 PID 1344 wrote to memory of 4140 1344 rundll32.exe 89 PID 1344 wrote to memory of 4140 1344 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d6502b60655e350ca1a3d36962e84a8b0187175d74d669812835b22737e8760.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d6502b60655e350ca1a3d36962e84a8b0187175d74d669812835b22737e8760.dll,#12⤵PID:4140
-