Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1.dll
Resource
win10v2004-20240508-en
General
-
Target
819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1.dll
-
Size
317KB
-
MD5
58138fc980b00369dd0eb88d7e15524d
-
SHA1
69e285b8a85ffd45a84b33da8f7e2acfaa24206c
-
SHA256
819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1
-
SHA512
a1757b99c81e1473c92a2df3d768f0cc2fa04c22fde42cb47feacb954be57386796a91c74c16b490c2b0c5de834311ffd8296ff26c9bc51a1a4a57aee7546e6b
-
SSDEEP
6144:zmWoza0a1IMVVEb3uqRpwIUV9lMYmFQqZRRphLuVucfb8ehbjN8wS21bKRTw4f3E:zmWQa0a1IMVr9eMqbRzLuVucfb8ehbjH
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3552 wrote to memory of 1732 3552 rundll32.exe rundll32.exe PID 3552 wrote to memory of 1732 3552 rundll32.exe rundll32.exe PID 3552 wrote to memory of 1732 3552 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\819e9d85404ed829ec0659be241fd2dca0d3749484b6dfbaea831a6257a10bb1.dll,#12⤵PID:1732