Analysis
-
max time kernel
127s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 00:36
Static task
static1
Behavioral task
behavioral1
Sample
94ac2303a11e51539e096c2bc39fe910865c1c131637f794c5277a8de09b363d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94ac2303a11e51539e096c2bc39fe910865c1c131637f794c5277a8de09b363d.dll
Resource
win10v2004-20240426-en
General
-
Target
94ac2303a11e51539e096c2bc39fe910865c1c131637f794c5277a8de09b363d.dll
-
Size
3.0MB
-
MD5
fe78f4fe597de90c30094e03dd3bc873
-
SHA1
c976bb2d6d1cad11ffb45bdbdaa8389c144fd060
-
SHA256
94ac2303a11e51539e096c2bc39fe910865c1c131637f794c5277a8de09b363d
-
SHA512
d6ec0f9f11a2fdf1ec46187da46b74451f476eb6885f5b42595df3f75bb8d16e8c779920fbf41c337860dccf0c39f2f3126d63347b89576cc4ef9ea1d31dc295
-
SSDEEP
49152:wa7Ux2qYB4OAmy900HXASAYDHi8hr9wtw1aYv7rwsiWy:H7UxWVu7izaaYv7rwsiWy
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 816 wrote to memory of 1936 816 rundll32.exe 82 PID 816 wrote to memory of 1936 816 rundll32.exe 82 PID 816 wrote to memory of 1936 816 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94ac2303a11e51539e096c2bc39fe910865c1c131637f794c5277a8de09b363d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94ac2303a11e51539e096c2bc39fe910865c1c131637f794c5277a8de09b363d.dll,#12⤵PID:1936
-