Analysis
-
max time kernel
101s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 22:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
64c31efdbe118bb81e41cf1677d75649df07cb36451f922216b54d276607b893.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
64c31efdbe118bb81e41cf1677d75649df07cb36451f922216b54d276607b893.dll
-
Size
618KB
-
MD5
18ef9398f03dba2d28e48d3795de4b4a
-
SHA1
ab401a6f684ecf15073b031adfc52de6bbd52165
-
SHA256
64c31efdbe118bb81e41cf1677d75649df07cb36451f922216b54d276607b893
-
SHA512
c84a4de650cbd7b330bc0ae6f86e4c5ec4d0141ae1deefc5c2b313d77171945ac8ba5b94b85ee2ddf353eda1be1c94a2947d2a598f1e1d64c937612eda31ab6f
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYZ:o6RI1Fo/wT3cJYYYYYYYYYYYYZ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1408 wrote to memory of 3388 1408 rundll32.exe 90 PID 1408 wrote to memory of 3388 1408 rundll32.exe 90 PID 1408 wrote to memory of 3388 1408 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64c31efdbe118bb81e41cf1677d75649df07cb36451f922216b54d276607b893.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64c31efdbe118bb81e41cf1677d75649df07cb36451f922216b54d276607b893.dll,#12⤵PID:3388
-