Analysis
-
max time kernel
131s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:37
Static task
static1
Behavioral task
behavioral1
Sample
63a38164b905201a097edfafcebd6c7549bb165ce08b4fd2f0bd98a9319c200c.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
63a38164b905201a097edfafcebd6c7549bb165ce08b4fd2f0bd98a9319c200c.dll
Resource
win10v2004-20240426-en
General
-
Target
63a38164b905201a097edfafcebd6c7549bb165ce08b4fd2f0bd98a9319c200c.dll
-
Size
81KB
-
MD5
13cd7ec78188a7149f919af487fae990
-
SHA1
c254f824b9e898f9e5d2353b7fc62d87c5847842
-
SHA256
63a38164b905201a097edfafcebd6c7549bb165ce08b4fd2f0bd98a9319c200c
-
SHA512
0c141461f46fcdc65de2d793c1d8aa06f076db0c170522b6871aceccdcedd9a3bc06c5f48542ff340e5f7e2e8b5f1e15a565c5c1b1323178e5e402aa9fa06c01
-
SSDEEP
1536:otByXv7uWGEqXZKXTadSp7Lxw9zzBPw+iASUSFOj8sWHcdF7zenq8Wl:o4v4JKXTx71w0ArSsXF3enq8Wl
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4600 wrote to memory of 2012 4600 rundll32.exe rundll32.exe PID 4600 wrote to memory of 2012 4600 rundll32.exe rundll32.exe PID 4600 wrote to memory of 2012 4600 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63a38164b905201a097edfafcebd6c7549bb165ce08b4fd2f0bd98a9319c200c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63a38164b905201a097edfafcebd6c7549bb165ce08b4fd2f0bd98a9319c200c.dll,#12⤵PID:2012