Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
6d75dd17f703b1846d4e06c9fd8c8d86c695e44c8912f1741ef373271001ab82.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6d75dd17f703b1846d4e06c9fd8c8d86c695e44c8912f1741ef373271001ab82.dll
Resource
win10v2004-20240419-en
General
-
Target
6d75dd17f703b1846d4e06c9fd8c8d86c695e44c8912f1741ef373271001ab82.dll
-
Size
470KB
-
MD5
6d1e9b0826cc6cd82188cb23bdfd5b14
-
SHA1
99de541d3573bab0225a85408c9183457cf90704
-
SHA256
6d75dd17f703b1846d4e06c9fd8c8d86c695e44c8912f1741ef373271001ab82
-
SHA512
e361fa3a8fbf25122f81eb34383d7626ea90ff4c323c151288e4a6b6bb81ebf5b6d8cda7d5f1aeb3fc141dbde353636077d5d8554fe105545cc8528226d28aaf
-
SSDEEP
6144:0KLyS6lMT/qkd4rz/pjjWbIRF+Y+O9lJnLzB3534PwlWS:RL7SPpOEHPrJfB3534PwQS
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 224 220 rundll32.exe 83 PID 220 wrote to memory of 224 220 rundll32.exe 83 PID 220 wrote to memory of 224 220 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d75dd17f703b1846d4e06c9fd8c8d86c695e44c8912f1741ef373271001ab82.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d75dd17f703b1846d4e06c9fd8c8d86c695e44c8912f1741ef373271001ab82.dll,#12⤵PID:224
-