Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
76508286820145cc0793eb28a18d82d2e70f82e98f76c0767b5b2c3dcbcfbd3a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
76508286820145cc0793eb28a18d82d2e70f82e98f76c0767b5b2c3dcbcfbd3a.dll
Resource
win10v2004-20240508-en
General
-
Target
76508286820145cc0793eb28a18d82d2e70f82e98f76c0767b5b2c3dcbcfbd3a.dll
-
Size
342KB
-
MD5
084b6567dbf15bc8eced45af022576fa
-
SHA1
81eb54e1dc6afb2593ee67437258a36478797509
-
SHA256
76508286820145cc0793eb28a18d82d2e70f82e98f76c0767b5b2c3dcbcfbd3a
-
SHA512
10a03996161be2c85918b1c45dc0f1e58ea93b285cc27d90cedc7245b7f92366591455d0fc5d01d6ba4da532672d9320b4e9138fcdb6897b0df0a463c7aaef62
-
SSDEEP
6144:JRoOpXN8bEvZehNyi5qlscXsKCkSLjn7WQDilmvWpJJvEig:JRoOpXCjNwlscXeJikilmvYEig
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4640 wrote to memory of 3576 4640 rundll32.exe 82 PID 4640 wrote to memory of 3576 4640 rundll32.exe 82 PID 4640 wrote to memory of 3576 4640 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76508286820145cc0793eb28a18d82d2e70f82e98f76c0767b5b2c3dcbcfbd3a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76508286820145cc0793eb28a18d82d2e70f82e98f76c0767b5b2c3dcbcfbd3a.dll,#12⤵PID:3576
-