Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 01:21
Behavioral task
behavioral1
Sample
643e6e51e42a4274005b853efc80ad54e8f6c8aa113cf415fb8bdebcc7399b84.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
643e6e51e42a4274005b853efc80ad54e8f6c8aa113cf415fb8bdebcc7399b84.dll
Resource
win10v2004-20240419-en
General
-
Target
643e6e51e42a4274005b853efc80ad54e8f6c8aa113cf415fb8bdebcc7399b84.dll
-
Size
142KB
-
MD5
a23fe0cd95fd358590d2bb681d277f9e
-
SHA1
e48876d7beffd78e9d877892b29f35a45d28b159
-
SHA256
643e6e51e42a4274005b853efc80ad54e8f6c8aa113cf415fb8bdebcc7399b84
-
SHA512
ffd2762b49e26e4072a15d30de4f5eefe4843c8bb987dbcf2a617964f083da790b7fb958a60c46ad967c54dbd884c121b67e49e2bfe4bfba42431156c7b50a1d
-
SSDEEP
3072:trPn1hcH98P67PBH2G3gFoh3H6J1vVjgQp3RpM1dpbQrQymzUOMgInmwuzqy/FEk:trP1hG98P67PNV3gih3H6J1VjgQp3RpO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1924 2420 rundll32.exe 85 PID 2420 wrote to memory of 1924 2420 rundll32.exe 85 PID 2420 wrote to memory of 1924 2420 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\643e6e51e42a4274005b853efc80ad54e8f6c8aa113cf415fb8bdebcc7399b84.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\643e6e51e42a4274005b853efc80ad54e8f6c8aa113cf415fb8bdebcc7399b84.dll,#12⤵PID:1924
-