Analysis
-
max time kernel
92s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
40a402ce33536fe79f786f4b3e7bdd6b46f2bdae55600ecf65d3fe257d4df139.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40a402ce33536fe79f786f4b3e7bdd6b46f2bdae55600ecf65d3fe257d4df139.dll
Resource
win10v2004-20240508-en
General
-
Target
40a402ce33536fe79f786f4b3e7bdd6b46f2bdae55600ecf65d3fe257d4df139.dll
-
Size
7KB
-
MD5
e9f85093e5145b68779eba64dc55dbc0
-
SHA1
6ef879c3116d4c2c048384bc4a58880719a031f5
-
SHA256
40a402ce33536fe79f786f4b3e7bdd6b46f2bdae55600ecf65d3fe257d4df139
-
SHA512
7a12a3457f5799acbe0ea4a6310b34dd0b98155c68e54da83451dfd4796f20ac14d9041d8da57abfabc1ec04d9f1ac124bdb8e7a750889e56e8559794621ee02
-
SSDEEP
48:Ss0QejYDx6/gB5B65/ic/2hmm3YGebeTKurfUsMbPssEWkd5Dvh1d8jKcCrYR4IS:z0QR9B6BvAwbUok58GcCr652X6N
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1160 wrote to memory of 4436 1160 rundll32.exe 83 PID 1160 wrote to memory of 4436 1160 rundll32.exe 83 PID 1160 wrote to memory of 4436 1160 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40a402ce33536fe79f786f4b3e7bdd6b46f2bdae55600ecf65d3fe257d4df139.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40a402ce33536fe79f786f4b3e7bdd6b46f2bdae55600ecf65d3fe257d4df139.dll,#12⤵PID:4436
-