Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
03dc17980856d065f52ea2ea895677e68d3b9dbf47d653a570dcb0484fcb0fea.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03dc17980856d065f52ea2ea895677e68d3b9dbf47d653a570dcb0484fcb0fea.dll
Resource
win10v2004-20240419-en
General
-
Target
03dc17980856d065f52ea2ea895677e68d3b9dbf47d653a570dcb0484fcb0fea.dll
-
Size
6KB
-
MD5
906269f64d9e4e645caf288259e2e311
-
SHA1
037ddd93aeb79c52e417b18e6b19c40bb6f7791a
-
SHA256
03dc17980856d065f52ea2ea895677e68d3b9dbf47d653a570dcb0484fcb0fea
-
SHA512
fbf6e80217d54b690d58cd52dca2942a1d9f2ab45536cc083dbf053fe6dc501208f5f5f54fbac32419d623917b1bf383dc672413a6c2b3519526d41b1cd0c425
-
SSDEEP
96:hy859x0P8MaQoyzxEOlyc1Zz/e0fyossxTtOT97vav0:F5oLSs3Pje09Bx5OT9TQ0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1896 4564 rundll32.exe 83 PID 4564 wrote to memory of 1896 4564 rundll32.exe 83 PID 4564 wrote to memory of 1896 4564 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03dc17980856d065f52ea2ea895677e68d3b9dbf47d653a570dcb0484fcb0fea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03dc17980856d065f52ea2ea895677e68d3b9dbf47d653a570dcb0484fcb0fea.dll,#12⤵PID:1896
-