Analysis
-
max time kernel
117s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
ba0b5b0dea15b367364eba844d4551976500d62bc097805e94c98ac832d2ccbc.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ba0b5b0dea15b367364eba844d4551976500d62bc097805e94c98ac832d2ccbc.dll
Resource
win10v2004-20240412-en
General
-
Target
ba0b5b0dea15b367364eba844d4551976500d62bc097805e94c98ac832d2ccbc.dll
-
Size
110KB
-
MD5
e3f1d76df80a5055e0308f49ef0928a5
-
SHA1
87e8f0a37af29a8868e53b4931ec74cbce2cb2a8
-
SHA256
ba0b5b0dea15b367364eba844d4551976500d62bc097805e94c98ac832d2ccbc
-
SHA512
c7e1c55d24bdba62dd3fef3ffe821f170ec3b898054cd901eeaae39ef5ad833c0855054d30dd97b589de4c0f2e9415e57f2ba0190981bcaf1360414135caea8e
-
SSDEEP
1536:627CfpTVUcK2ivkxOHA0zYLkz/Y9yq1bYVIhRYk4uHE3N:3mfOTvKO3zC2uUahyk4uHE
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1068 wrote to memory of 4668 1068 rundll32.exe 84 PID 1068 wrote to memory of 4668 1068 rundll32.exe 84 PID 1068 wrote to memory of 4668 1068 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ba0b5b0dea15b367364eba844d4551976500d62bc097805e94c98ac832d2ccbc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ba0b5b0dea15b367364eba844d4551976500d62bc097805e94c98ac832d2ccbc.dll,#12⤵PID:4668
-