Analysis
-
max time kernel
93s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
de5a66e45fce210c47354572bda62a70533854ed1205e4db3dccaccc3aa55555.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de5a66e45fce210c47354572bda62a70533854ed1205e4db3dccaccc3aa55555.dll
Resource
win10v2004-20240412-en
General
-
Target
de5a66e45fce210c47354572bda62a70533854ed1205e4db3dccaccc3aa55555.dll
-
Size
5KB
-
MD5
ac2e93a022b17762cd92d5f7d06430f7
-
SHA1
e58242e2dbe472f5ddff9fb73daff2df7bea80f9
-
SHA256
de5a66e45fce210c47354572bda62a70533854ed1205e4db3dccaccc3aa55555
-
SHA512
cc9c0d812d0d85eb362103d2ecca7acded6c586759fd4d205a6a6ea1ab350b58bb2c8d767e5459c7e170d1e6d88cd1654013d845ac7b0a6adc0da3948f09d73b
-
SSDEEP
96:hy859x0P8MaSpPCMcJIcJMzQICJxIaUF1l4ICJkl4A2yQwQ6yY:F5oL/Ct5+CnIX9mzA2y/Q6y
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1380 1928 rundll32.exe 87 PID 1928 wrote to memory of 1380 1928 rundll32.exe 87 PID 1928 wrote to memory of 1380 1928 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de5a66e45fce210c47354572bda62a70533854ed1205e4db3dccaccc3aa55555.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de5a66e45fce210c47354572bda62a70533854ed1205e4db3dccaccc3aa55555.dll,#12⤵PID:1380
-