Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
d17da65563fc84615a7d18c610f67f8ab3d2a925d48c19737b1588c54a6b1915.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d17da65563fc84615a7d18c610f67f8ab3d2a925d48c19737b1588c54a6b1915.dll
Resource
win10v2004-20240226-en
General
-
Target
d17da65563fc84615a7d18c610f67f8ab3d2a925d48c19737b1588c54a6b1915.dll
-
Size
7KB
-
MD5
788711ed48f2672825fee3ba47ea3635
-
SHA1
b67bcd2a08d39a669fa61d09e1b437ee2bf31464
-
SHA256
d17da65563fc84615a7d18c610f67f8ab3d2a925d48c19737b1588c54a6b1915
-
SHA512
1f4df8cfb639ed7102de539a1b8f1d5d293d7d96bedfb7b4e7499c1370b9e6bbc0cacdfaebbf0ef5528cf62403cddfb2c7c091725c853d0efc343e100da2ff0a
-
SSDEEP
48:66ay5YVO3EVkApc2wp8hH1NZn5EquglQ067YbPWobABbgL3q9J5S2hmc:b3EVkApcX4Hiv0hbPOq3qX5S2hV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4924 wrote to memory of 3496 4924 rundll32.exe 85 PID 4924 wrote to memory of 3496 4924 rundll32.exe 85 PID 4924 wrote to memory of 3496 4924 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d17da65563fc84615a7d18c610f67f8ab3d2a925d48c19737b1588c54a6b1915.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d17da65563fc84615a7d18c610f67f8ab3d2a925d48c19737b1588c54a6b1915.dll,#12⤵PID:3496
-