Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
2f50c4764a0b3099de093d3877b422b3aa40db6b086d2cb4bca7a646e9c04c1d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f50c4764a0b3099de093d3877b422b3aa40db6b086d2cb4bca7a646e9c04c1d.dll
Resource
win10v2004-20240412-en
General
-
Target
2f50c4764a0b3099de093d3877b422b3aa40db6b086d2cb4bca7a646e9c04c1d.dll
-
Size
5KB
-
MD5
2098da6de2b2ccc369bebef4aad963d6
-
SHA1
88b587b4f9ca6f7a9b98bd88041f7d2cab981f67
-
SHA256
2f50c4764a0b3099de093d3877b422b3aa40db6b086d2cb4bca7a646e9c04c1d
-
SHA512
1a46c869abaaedd1650ccb89117adde0f530a53da7a843b5975d27ab73cf58628641756832349a25b4bf5c06d7bff7c67d8b75c27d624cbdc330011f82cabe00
-
SSDEEP
96:hy859x0P8MaPkkKl0PykswS/v8lR7WuR4S6hsN/z21+:F5oL55k6ngYum4Jz21+
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 2272 4444 rundll32.exe 85 PID 4444 wrote to memory of 2272 4444 rundll32.exe 85 PID 4444 wrote to memory of 2272 4444 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f50c4764a0b3099de093d3877b422b3aa40db6b086d2cb4bca7a646e9c04c1d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f50c4764a0b3099de093d3877b422b3aa40db6b086d2cb4bca7a646e9c04c1d.dll,#12⤵PID:2272
-