Analysis
-
max time kernel
129s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
8a90af5955871100d8013af3381d3f419468314360640026f07496deffb88e4a.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8a90af5955871100d8013af3381d3f419468314360640026f07496deffb88e4a.dll
Resource
win10v2004-20240508-en
General
-
Target
8a90af5955871100d8013af3381d3f419468314360640026f07496deffb88e4a.dll
-
Size
166KB
-
MD5
19722cd8a1a9bc894ce0659367ed4c21
-
SHA1
7b82e6050f031c2e722696af94e8cd2b0d627cc5
-
SHA256
8a90af5955871100d8013af3381d3f419468314360640026f07496deffb88e4a
-
SHA512
b1400e8f158146169463cdcc86b9d8e3d0288a8cb1b7b4104be74353f401f775767b06d292f552b6f13f74267de8c57f45d658e17fa6fe7bef8597143f895be5
-
SSDEEP
3072:nwH0WGeV3AaC7ydwgaRUqpVURkr1EhnzAGJvg13:n40o3AaCeyQRS1ElVJvg1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4400 wrote to memory of 4824 4400 rundll32.exe rundll32.exe PID 4400 wrote to memory of 4824 4400 rundll32.exe rundll32.exe PID 4400 wrote to memory of 4824 4400 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a90af5955871100d8013af3381d3f419468314360640026f07496deffb88e4a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a90af5955871100d8013af3381d3f419468314360640026f07496deffb88e4a.dll,#12⤵PID:4824