Analysis
-
max time kernel
92s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
7282085ec8b829aeb3c6bbcd2fe4213a764602665391f7e42d727b4f11a93956.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7282085ec8b829aeb3c6bbcd2fe4213a764602665391f7e42d727b4f11a93956.dll
Resource
win10v2004-20240412-en
General
-
Target
7282085ec8b829aeb3c6bbcd2fe4213a764602665391f7e42d727b4f11a93956.dll
-
Size
81KB
-
MD5
868dde5df249430224763ee34a56ca9d
-
SHA1
539edeed111695a30098d4ce1d531e61cfe81538
-
SHA256
7282085ec8b829aeb3c6bbcd2fe4213a764602665391f7e42d727b4f11a93956
-
SHA512
00b75548d528bd05059736970cf60f459ac3777ef03a202d9a08f402682fa1cb92557ff9f9a2d68ffee0ab930162c8a55c6ca62e7f4e67f603d32fcdfc1b01bb
-
SSDEEP
1536:lByXv7uWGEqXZKXTadSp7Lxw9zzBPw+NASUSFOj8sWHcdF6+eXq8WB:gv4JKXTx71wnArSsXFpeXq8WB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2168 wrote to memory of 692 2168 rundll32.exe 84 PID 2168 wrote to memory of 692 2168 rundll32.exe 84 PID 2168 wrote to memory of 692 2168 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7282085ec8b829aeb3c6bbcd2fe4213a764602665391f7e42d727b4f11a93956.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7282085ec8b829aeb3c6bbcd2fe4213a764602665391f7e42d727b4f11a93956.dll,#12⤵PID:692
-