Analysis
-
max time kernel
144s -
max time network
160s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-03-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
44be3153c15c2d18f49674a092c135d3482fb89b77a1b2063d01d02985555fe0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
44be3153c15c2d18f49674a092c135d3482fb89b77a1b2063d01d02985555fe0.dll
Resource
win11-20240221-en
General
-
Target
44be3153c15c2d18f49674a092c135d3482fb89b77a1b2063d01d02985555fe0.dll
-
Size
248KB
-
MD5
63a1fe06be877497c4c2017ca0303537
-
SHA1
f4f9cbd7066afb86877bb79c3d23eddaca15f5a0
-
SHA256
44be3153c15c2d18f49674a092c135d3482fb89b77a1b2063d01d02985555fe0
-
SHA512
0475edc7dfbe8660e27d93b7b8b5162043f1f8052ab28c87e23a6daf9a5cb93d0d7888b6e57504b1f2359b34c487d9f02d85a34a7f17c04188318bb8e89126bf
-
SSDEEP
6144:uI7A8DMhFE2PlKOcpHSvV6x/CHQyhvs277H0mhWGzTdtb2bbIFxW7zrM2ruyYz+h:uI7A8DMhFE2PlbcpSv0x/CJVUmhDzTvS
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4240 wrote to memory of 4412 4240 rundll32.exe rundll32.exe PID 4240 wrote to memory of 4412 4240 rundll32.exe rundll32.exe PID 4240 wrote to memory of 4412 4240 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44be3153c15c2d18f49674a092c135d3482fb89b77a1b2063d01d02985555fe0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44be3153c15c2d18f49674a092c135d3482fb89b77a1b2063d01d02985555fe0.dll,#12⤵PID:4412
-