Analysis
-
max time kernel
136s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 03:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b4f6ca17a7df0330fb7a32a801517d869219f46971728fffe13d14b8e17c227d.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
b4f6ca17a7df0330fb7a32a801517d869219f46971728fffe13d14b8e17c227d.dll
-
Size
618KB
-
MD5
332e5a75003dafdbef26c79b0a69501a
-
SHA1
8174aa666f6ff53a8bd7c84d44704a27a3a36a0a
-
SHA256
b4f6ca17a7df0330fb7a32a801517d869219f46971728fffe13d14b8e17c227d
-
SHA512
783a0e1398a7e35bd89853be53b448d8fecac0fb8127cceb781b55ba55575838972beedc1f9bf6092a293f2e75b59372e34f9ae7fa286199bb5dba2a247ed85d
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYz:o6RI1Fo/wT3cJYYYYYYYYYYYYz
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3948 wrote to memory of 2688 3948 rundll32.exe 83 PID 3948 wrote to memory of 2688 3948 rundll32.exe 83 PID 3948 wrote to memory of 2688 3948 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4f6ca17a7df0330fb7a32a801517d869219f46971728fffe13d14b8e17c227d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4f6ca17a7df0330fb7a32a801517d869219f46971728fffe13d14b8e17c227d.dll,#12⤵PID:2688
-