Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
4666fc99d71c6fa0251a6828ea1b1f72697152610fe1e4d7ee7980679f8cb265.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4666fc99d71c6fa0251a6828ea1b1f72697152610fe1e4d7ee7980679f8cb265.dll
Resource
win10v2004-20240412-en
General
-
Target
4666fc99d71c6fa0251a6828ea1b1f72697152610fe1e4d7ee7980679f8cb265.dll
-
Size
6KB
-
MD5
39b07ea4e4505c4848dbd8a7cb283f9a
-
SHA1
d8b6118b6163fe3220a2e1c94e177c56ff51d278
-
SHA256
4666fc99d71c6fa0251a6828ea1b1f72697152610fe1e4d7ee7980679f8cb265
-
SHA512
8212f202c5a0f5de553bf9a81ca9727bc5fbcfbc10f809e37dd5c467e32675ffc545963ce107cd1d005c373ce81e56d6728a7ce13f19a05c9379fa12f7624494
-
SSDEEP
96:hy859x0P8MaWCOUaBLiaMUyO9x2qq9iyLklhdsV+719X9:F5oL3lJLicyO9zsitlhd+g19X
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4752 wrote to memory of 2116 4752 rundll32.exe 80 PID 4752 wrote to memory of 2116 4752 rundll32.exe 80 PID 4752 wrote to memory of 2116 4752 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4666fc99d71c6fa0251a6828ea1b1f72697152610fe1e4d7ee7980679f8cb265.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4666fc99d71c6fa0251a6828ea1b1f72697152610fe1e4d7ee7980679f8cb265.dll,#12⤵PID:2116
-