Analysis
-
max time kernel
124s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
baa44529f06a475db88b5a6ecaa7ebb5100884039957a7c0acceb6707fe1b797.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
baa44529f06a475db88b5a6ecaa7ebb5100884039957a7c0acceb6707fe1b797.dll
Resource
win10v2004-20240412-en
General
-
Target
baa44529f06a475db88b5a6ecaa7ebb5100884039957a7c0acceb6707fe1b797.dll
-
Size
5KB
-
MD5
8d1e91834abf9048e048ff1b7683698c
-
SHA1
11ddd61570ded1befb67eea8f567dce07c323277
-
SHA256
baa44529f06a475db88b5a6ecaa7ebb5100884039957a7c0acceb6707fe1b797
-
SHA512
4268078641f982f8dfadaa731e0c9eaa085bcbea94aa00df5b8354ed36317f717c33c1e97af9db027b12e3cf689218555855b3ecc103dc9d9f77ae7159acc3f6
-
SSDEEP
96:DixZjmjtjd8jPjcZGR5TIR9qcTGbJFQg0/xq75wO/KD8w7A0VyfE3mq08wZz2w:unSR6bgYdgw10/8NwO/q8wnjB08wZz2w
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4012 wrote to memory of 3976 4012 rundll32.exe 92 PID 4012 wrote to memory of 3976 4012 rundll32.exe 92 PID 4012 wrote to memory of 3976 4012 rundll32.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\baa44529f06a475db88b5a6ecaa7ebb5100884039957a7c0acceb6707fe1b797.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\baa44529f06a475db88b5a6ecaa7ebb5100884039957a7c0acceb6707fe1b797.dll,#12⤵PID:3976
-