Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
15e740e67dd24ef86d785fdfa28e2e0e775adf31229b20e7d33639b7dad30274.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15e740e67dd24ef86d785fdfa28e2e0e775adf31229b20e7d33639b7dad30274.dll
Resource
win10v2004-20240226-en
General
-
Target
15e740e67dd24ef86d785fdfa28e2e0e775adf31229b20e7d33639b7dad30274.dll
-
Size
81KB
-
MD5
358a39633f84d938efde8e7d58a2a1fe
-
SHA1
5dc0e03c6ad515892e2d1005f849176c0f355f63
-
SHA256
15e740e67dd24ef86d785fdfa28e2e0e775adf31229b20e7d33639b7dad30274
-
SHA512
ee409a89577e8fae2b69b172d6fbfa78b242643cc4243a183d642deb4873f7007cdc069565e25dd8fb40e5ac99843ee171f71036fc90fa3434ca954da007f787
-
SSDEEP
1536:9c+UPvS0RKCmqAvj45Hx8u05iecuYSoosWaocdBkez0U+GT:6+5oxmqAiR8+/RBkez0U+g
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1292 wrote to memory of 4904 1292 rundll32.exe 86 PID 1292 wrote to memory of 4904 1292 rundll32.exe 86 PID 1292 wrote to memory of 4904 1292 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15e740e67dd24ef86d785fdfa28e2e0e775adf31229b20e7d33639b7dad30274.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15e740e67dd24ef86d785fdfa28e2e0e775adf31229b20e7d33639b7dad30274.dll,#12⤵PID:4904
-