Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
570cf95c4515014dc88fd4b062afa4f6b5d93b70be4c194b8381f527310f6128.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
570cf95c4515014dc88fd4b062afa4f6b5d93b70be4c194b8381f527310f6128.dll
Resource
win10v2004-20240508-en
General
-
Target
570cf95c4515014dc88fd4b062afa4f6b5d93b70be4c194b8381f527310f6128.dll
-
Size
1.7MB
-
MD5
fae3faac62b93351c6c8ebb5360a0545
-
SHA1
7b062af6f0488da7f7f27c5bfedc2a9794802d1f
-
SHA256
570cf95c4515014dc88fd4b062afa4f6b5d93b70be4c194b8381f527310f6128
-
SHA512
a20a6aa16c042c38d6e910eb243f0dd60607f84435223a19383a485335b641aa23a34b59e0a51819c3486d6aeafc0e14ec93a9dcfbbf99aa94a4ee1f1b31a443
-
SSDEEP
24576:fmOn90i8/JMKrJFuj9R4dE01217VP7pNrI1b42w+DqoSFP4kV5390ak3wRPPKRoG:f190vpJK+q1URUP4kV53DbKRokBAw
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3104 wrote to memory of 3380 3104 rundll32.exe 84 PID 3104 wrote to memory of 3380 3104 rundll32.exe 84 PID 3104 wrote to memory of 3380 3104 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\570cf95c4515014dc88fd4b062afa4f6b5d93b70be4c194b8381f527310f6128.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\570cf95c4515014dc88fd4b062afa4f6b5d93b70be4c194b8381f527310f6128.dll,#12⤵PID:3380
-