Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
f97f26f9cb210c0fcf2b50b7b9c8c93192b420cdbd946226ec2848fd19a9af2c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f97f26f9cb210c0fcf2b50b7b9c8c93192b420cdbd946226ec2848fd19a9af2c.dll
Resource
win10v2004-20231215-en
General
-
Target
f97f26f9cb210c0fcf2b50b7b9c8c93192b420cdbd946226ec2848fd19a9af2c.dll
-
Size
168KB
-
MD5
384a9215bfa2fc9454f55b0169cf8e1f
-
SHA1
8cc5cd371ae7aee0657cab451aa17895a04f3c8f
-
SHA256
f97f26f9cb210c0fcf2b50b7b9c8c93192b420cdbd946226ec2848fd19a9af2c
-
SHA512
092df790dddfbbd48baf4bc1207bbb3095a72a5fbaba356cd3d260516e3c69a5ada0079d62947d6219439c24f78f12312ecb8801e577872dcc61643f8a5c93ca
-
SSDEEP
3072:0o4LzK7LUdPy42tKMguO7WOnJFLUs4hIOfV2YyguEC9B2pqeOVXmb+V:IeIa0BuO7WOnJxU1InYrqeOV2W
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1340 wrote to memory of 5040 1340 rundll32.exe 85 PID 1340 wrote to memory of 5040 1340 rundll32.exe 85 PID 1340 wrote to memory of 5040 1340 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f97f26f9cb210c0fcf2b50b7b9c8c93192b420cdbd946226ec2848fd19a9af2c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f97f26f9cb210c0fcf2b50b7b9c8c93192b420cdbd946226ec2848fd19a9af2c.dll,#12⤵PID:5040
-