Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
f273dbca011d0acd63ff49a4c8fc18787fc9396844fa3ba34df9aacf5dab1e1f.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f273dbca011d0acd63ff49a4c8fc18787fc9396844fa3ba34df9aacf5dab1e1f.dll
Resource
win10v2004-20240508-en
General
-
Target
f273dbca011d0acd63ff49a4c8fc18787fc9396844fa3ba34df9aacf5dab1e1f.dll
-
Size
81KB
-
MD5
5014944d890003433d964e60dc04f74c
-
SHA1
24194662d5298b33cb6ba6458b8c2284ada3088e
-
SHA256
f273dbca011d0acd63ff49a4c8fc18787fc9396844fa3ba34df9aacf5dab1e1f
-
SHA512
157d5fc46e90f098bf602d47b2f2ffee97aa476db5427e8ff59bf01fe5e2e080594c13297a89a9bf009b0467f6d5f0de2b85d47b020bc9d4492eeeae3be76a25
-
SSDEEP
1536:utByXv7uWGEqXZKXTadSp7Lxw9zzBPw+iASUSFOj8sWHcdF7zenq8WX:u4v4JKXTx71w0ArSsXF3enq8WX
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3644 3004 rundll32.exe 83 PID 3004 wrote to memory of 3644 3004 rundll32.exe 83 PID 3004 wrote to memory of 3644 3004 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f273dbca011d0acd63ff49a4c8fc18787fc9396844fa3ba34df9aacf5dab1e1f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f273dbca011d0acd63ff49a4c8fc18787fc9396844fa3ba34df9aacf5dab1e1f.dll,#12⤵PID:3644
-