Analysis
-
max time kernel
299s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
02/05/2024, 05:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe
Resource
win7-20240419-en
3 signatures
300 seconds
General
-
Target
4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe
-
Size
1.9MB
-
MD5
426a8ae17ab047f1ce5313bf1f422fc3
-
SHA1
f8a9a83c4d77b13d08d203997c5df167d0290261
-
SHA256
4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590
-
SHA512
080d807d4d9c579cb690413b5d60c1bd6d1aaa27a0195a12d79b3c1eb64e72b1ab9fecf989a0fec0bad0d34bac7e4277bea9cc10254747ada639463042897a19
-
SSDEEP
49152:9ZHrxCcxEnA8HTeKt8093ysCTKvcXoQQq:r9eAoegIa
Malware Config
Signatures
-
Blocklisted process makes network request 61 IoCs
flow pid Process 1 4616 rundll32.exe 2 4616 rundll32.exe 4 4616 rundll32.exe 5 4616 rundll32.exe 6 4616 rundll32.exe 8 4616 rundll32.exe 9 4616 rundll32.exe 10 4616 rundll32.exe 11 4616 rundll32.exe 12 4616 rundll32.exe 13 4616 rundll32.exe 14 4616 rundll32.exe 15 4616 rundll32.exe 16 4616 rundll32.exe 20 4616 rundll32.exe 21 4616 rundll32.exe 22 4616 rundll32.exe 23 4616 rundll32.exe 24 4616 rundll32.exe 25 4616 rundll32.exe 26 4616 rundll32.exe 27 4616 rundll32.exe 28 4616 rundll32.exe 29 4616 rundll32.exe 30 4616 rundll32.exe 31 4616 rundll32.exe 40 4616 rundll32.exe 41 4616 rundll32.exe 42 4616 rundll32.exe 43 4616 rundll32.exe 44 4616 rundll32.exe 45 4616 rundll32.exe 46 4616 rundll32.exe 47 4616 rundll32.exe 48 4616 rundll32.exe 49 4616 rundll32.exe 50 4616 rundll32.exe 51 4616 rundll32.exe 55 4616 rundll32.exe 56 4616 rundll32.exe 57 4616 rundll32.exe 58 4616 rundll32.exe 59 4616 rundll32.exe 60 4616 rundll32.exe 61 4616 rundll32.exe 62 4616 rundll32.exe 63 4616 rundll32.exe 64 4616 rundll32.exe 65 4616 rundll32.exe 66 4616 rundll32.exe 67 4616 rundll32.exe 68 4616 rundll32.exe 69 4616 rundll32.exe 70 4616 rundll32.exe 71 4616 rundll32.exe 72 4616 rundll32.exe 73 4616 rundll32.exe 74 4616 rundll32.exe 75 4616 rundll32.exe 76 4616 rundll32.exe 77 4616 rundll32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73 PID 4024 wrote to memory of 4616 4024 4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe"C:\Users\Admin\AppData\Local\Temp\4f0925a84a5c9624ef8f734239ee56188ba9341d48dc0f07db902e59743a4590.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:4616
-