Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
2931927c03857c3ef21f718783fb1a00de4e563a8d4a1e3b6cf7eee3018147a6.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2931927c03857c3ef21f718783fb1a00de4e563a8d4a1e3b6cf7eee3018147a6.dll
Resource
win10v2004-20240426-en
General
-
Target
2931927c03857c3ef21f718783fb1a00de4e563a8d4a1e3b6cf7eee3018147a6.dll
-
Size
1.4MB
-
MD5
0831f6c0aee6d5999af415bf017c747a
-
SHA1
99832d21cd7901c4aba33980eaace1d2dd99074e
-
SHA256
2931927c03857c3ef21f718783fb1a00de4e563a8d4a1e3b6cf7eee3018147a6
-
SHA512
6e91bf537ca78f14d512e26febeee85a0702f329de1d721bee1e23809c85316259b13acba2e61f5a9e65dd91c73ac4f1452b317b908dfe7e60d0569be6d1fe5d
-
SSDEEP
6144:U8u0tUUWB6BJUDf6EumymQNE+/gH3333nnnH333mzTa:xB2Df6Eumy7x
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1492 wrote to memory of 4568 1492 rundll32.exe 81 PID 1492 wrote to memory of 4568 1492 rundll32.exe 81 PID 1492 wrote to memory of 4568 1492 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2931927c03857c3ef21f718783fb1a00de4e563a8d4a1e3b6cf7eee3018147a6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2931927c03857c3ef21f718783fb1a00de4e563a8d4a1e3b6cf7eee3018147a6.dll,#12⤵PID:4568
-