Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
1dfee5c5563ee1be0ae8e062b2aeeddf7691edaea82d0249f0a36ab67be6fb29.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1dfee5c5563ee1be0ae8e062b2aeeddf7691edaea82d0249f0a36ab67be6fb29.dll
Resource
win10v2004-20240226-en
General
-
Target
1dfee5c5563ee1be0ae8e062b2aeeddf7691edaea82d0249f0a36ab67be6fb29.dll
-
Size
2.9MB
-
MD5
90aebef76771b6d7f216b6a0f82af3bc
-
SHA1
1b3548d8574b3b902b9cad648b75efc8780857b8
-
SHA256
1dfee5c5563ee1be0ae8e062b2aeeddf7691edaea82d0249f0a36ab67be6fb29
-
SHA512
5600e0ad6342a60c55499c40e45d310ef1e3ff18d8adcc9cb1abc075a0cba142a3356d224a6e30f5dd4b4a5e3b7b1efbdfe6dabae35dfad8022563cf652ff031
-
SSDEEP
49152:jmekDCfuXW/fMFYxZ6ADtTq8Nni5QiMDJkY/dCHBa+VyMXbMIwDt8P:ieOm3MFMdmWnirMaYz+zLMIwm
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4708 wrote to memory of 2760 4708 rundll32.exe 90 PID 4708 wrote to memory of 2760 4708 rundll32.exe 90 PID 4708 wrote to memory of 2760 4708 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1dfee5c5563ee1be0ae8e062b2aeeddf7691edaea82d0249f0a36ab67be6fb29.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1dfee5c5563ee1be0ae8e062b2aeeddf7691edaea82d0249f0a36ab67be6fb29.dll,#12⤵PID:2760
-