Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
94d71c0e8bbb8d43cee090f289c8ed785bb979b8da4d40cda051668380af3fdb.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94d71c0e8bbb8d43cee090f289c8ed785bb979b8da4d40cda051668380af3fdb.dll
Resource
win10v2004-20240226-en
General
-
Target
94d71c0e8bbb8d43cee090f289c8ed785bb979b8da4d40cda051668380af3fdb.dll
-
Size
6KB
-
MD5
0486b6eeba8ae6dbd6043045f13543a6
-
SHA1
366b078fad9ff4ee29c90bc8af48a7b72d01d2ed
-
SHA256
94d71c0e8bbb8d43cee090f289c8ed785bb979b8da4d40cda051668380af3fdb
-
SHA512
69d3817db6186d39cc319d13f44a9db116f7053f53ec5d6b09e7209a7dfac458ecb5b887b3acc1402116d50adc05f30a7730c1c23b94a934a470241d14fa2175
-
SSDEEP
96:nEY2RrF1eqwi4WNmi/1cs/ai3/87IwuBj+IGRXebztV:EHRh1eppW8i/ag8mj+LXe
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4404 wrote to memory of 2020 4404 rundll32.exe 87 PID 4404 wrote to memory of 2020 4404 rundll32.exe 87 PID 4404 wrote to memory of 2020 4404 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94d71c0e8bbb8d43cee090f289c8ed785bb979b8da4d40cda051668380af3fdb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94d71c0e8bbb8d43cee090f289c8ed785bb979b8da4d40cda051668380af3fdb.dll,#12⤵PID:2020
-