Analysis
-
max time kernel
134s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
95c971f02fed01867cbc9544650c13674c4a2c6ce43d3810bcfe4fe5c2269ae2.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
95c971f02fed01867cbc9544650c13674c4a2c6ce43d3810bcfe4fe5c2269ae2.dll
Resource
win10v2004-20240426-en
General
-
Target
95c971f02fed01867cbc9544650c13674c4a2c6ce43d3810bcfe4fe5c2269ae2.dll
-
Size
327KB
-
MD5
089a093eff9fadadf52580a31bc11b72
-
SHA1
05ab4bf3c7ed6360d5b16b5a13a44ae6ea164d5b
-
SHA256
95c971f02fed01867cbc9544650c13674c4a2c6ce43d3810bcfe4fe5c2269ae2
-
SHA512
8810efe3c640a868cf817d1a907acfef3a19caee5e8a0f5a2493d1a7dca3726ac8c6cbea57eb0e4d707aaa292cd341e2404c8303daec72eba407a92ec3d63572
-
SSDEEP
6144:EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC48Ss9Ei:EmWhND9yJz+b1FcMLmp2AT8Ssd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2040 wrote to memory of 2508 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 2508 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 2508 2040 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95c971f02fed01867cbc9544650c13674c4a2c6ce43d3810bcfe4fe5c2269ae2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95c971f02fed01867cbc9544650c13674c4a2c6ce43d3810bcfe4fe5c2269ae2.dll,#12⤵PID:2508