Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 12:21
Static task
static1
Behavioral task
behavioral1
Sample
4596300f9bf44713543bbd273ffbbafd1c17c911aa8d0a8e4285038783150d4f.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4596300f9bf44713543bbd273ffbbafd1c17c911aa8d0a8e4285038783150d4f.dll
Resource
win10v2004-20240508-en
General
-
Target
4596300f9bf44713543bbd273ffbbafd1c17c911aa8d0a8e4285038783150d4f.dll
-
Size
284KB
-
MD5
141c0acf11340957687449c81e8514ce
-
SHA1
c697eb4b8e5961e4aed98062636bb2f7fbed2945
-
SHA256
4596300f9bf44713543bbd273ffbbafd1c17c911aa8d0a8e4285038783150d4f
-
SHA512
a8f3d881e5522f5fb90cb6b40bf59b5386e9bc71f888f10162edb05de4f85edcb9fd6a9e7093b27785b96f8b7ef420b1fe17487f1c83b0df3ee9c8befd50f03d
-
SSDEEP
3072:H45lOLDKXYHlJdlwjrxpsSYXcTGDcjjQKeKtLYn5vZO36jZGhMUfcKP5dY1ep:UOv/lTlwjrLsSOIfwyGvk6jMKGY1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1824 wrote to memory of 5000 1824 rundll32.exe 83 PID 1824 wrote to memory of 5000 1824 rundll32.exe 83 PID 1824 wrote to memory of 5000 1824 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4596300f9bf44713543bbd273ffbbafd1c17c911aa8d0a8e4285038783150d4f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4596300f9bf44713543bbd273ffbbafd1c17c911aa8d0a8e4285038783150d4f.dll,#12⤵PID:5000
-