Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 18:49
Static task
static1
Behavioral task
behavioral1
Sample
74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a.dll
Resource
win11-20240221-en
General
-
Target
74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a.dll
-
Size
251KB
-
MD5
4e52d739c324db8225bd9ab2695f262f
-
SHA1
71c3da43dc5a0d2a1941e874a6d015a071783889
-
SHA256
74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
-
SHA512
2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6
-
SSDEEP
6144:/yF/zX2zfRkU62THVh/T2AhZxv6A31obD6Hq/8jis+FvtVRpsAAs0o8OqTYz+xnU:/yRzX2zfRkX2T1h/SA5PF9m8jJqKYz+y
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4412 wrote to memory of 3392 4412 rundll32.exe rundll32.exe PID 4412 wrote to memory of 3392 4412 rundll32.exe rundll32.exe PID 4412 wrote to memory of 3392 4412 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a.dll,#12⤵PID:3392