Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
5461d517c7cd3a86cf7011b09d357fd42abbfe2d34d516e9051a5a9557440ff0.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5461d517c7cd3a86cf7011b09d357fd42abbfe2d34d516e9051a5a9557440ff0.dll
Resource
win10v2004-20240426-en
General
-
Target
5461d517c7cd3a86cf7011b09d357fd42abbfe2d34d516e9051a5a9557440ff0.dll
-
Size
380KB
-
MD5
61b70355d9ed7521d8f66406a72893b0
-
SHA1
580978b8f6f87a51cc937d044d7b08ab96cb548d
-
SHA256
5461d517c7cd3a86cf7011b09d357fd42abbfe2d34d516e9051a5a9557440ff0
-
SHA512
b7c6f018cfbfdb08d5d3efa52846a0a0d20ec65a5e93991932bfebbe62bf403f17a4b3d59bb23e72c232e0765c707faad4cebef6f192486becf93b481162d387
-
SSDEEP
6144:Vzb1qGN520kAltKaP21FwBgXEM4o6vHewpPRrj5Q:Vzb1z73tKaP21FwBIv4ZvXb5
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1416 wrote to memory of 1392 1416 rundll32.exe rundll32.exe PID 1416 wrote to memory of 1392 1416 rundll32.exe rundll32.exe PID 1416 wrote to memory of 1392 1416 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5461d517c7cd3a86cf7011b09d357fd42abbfe2d34d516e9051a5a9557440ff0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5461d517c7cd3a86cf7011b09d357fd42abbfe2d34d516e9051a5a9557440ff0.dll,#12⤵PID:1392