Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
10386b4dd8c3295306105b6ecada027c5194c6bbea7410c474fbffc558e4a4ed.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
10386b4dd8c3295306105b6ecada027c5194c6bbea7410c474fbffc558e4a4ed.dll
Resource
win10v2004-20240412-en
General
-
Target
10386b4dd8c3295306105b6ecada027c5194c6bbea7410c474fbffc558e4a4ed.dll
-
Size
187KB
-
MD5
23df8f78a98fb56da0dc436da5947fb4
-
SHA1
31d29b5f60adee8394f2473cb464b97a6ab4179f
-
SHA256
10386b4dd8c3295306105b6ecada027c5194c6bbea7410c474fbffc558e4a4ed
-
SHA512
dfd61aba3bd1c25f1819f2675c2787a3e5f64c7c47c4c7717fb7e355e2dcd30c0360139c338aa5576f7f97acc4c6f0b69bbfe6ca67177c9edfa5fc712338d700
-
SSDEEP
3072:ANwI/BnZSQgY7zJAW3mOKWa84x6BMylL4Lx22lQBV+UdE+rECWp7hK3jwXc:r+JdTmOK8S6BMylBV+UdvrEFp7hKz7
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2652 4604 rundll32.exe 84 PID 4604 wrote to memory of 2652 4604 rundll32.exe 84 PID 4604 wrote to memory of 2652 4604 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10386b4dd8c3295306105b6ecada027c5194c6bbea7410c474fbffc558e4a4ed.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10386b4dd8c3295306105b6ecada027c5194c6bbea7410c474fbffc558e4a4ed.dll,#12⤵PID:2652
-