Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b.dll
Resource
win10v2004-20240426-en
General
-
Target
a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b.dll
-
Size
4.7MB
-
MD5
f8fe01a9ea11c9752b50afd4d3f80717
-
SHA1
9e67c6e0fd86e6f0cc0170e47b52ebfa04957c98
-
SHA256
a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b
-
SHA512
f8c0c348142224e2dc339bce5f283642516bd5e068be4b97fd3eca5fcaa81914e539644d04763216323e3ae97c4c603257fc5fab6bea081dc66a8fa79a18224a
-
SSDEEP
98304:V06qoT/AuwfHQL3H2m/ltB0+KwZ4kTMeKkYm:C6qG/AuWQL3T/ltB0+KwZ4kTMe+m
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3700 wrote to memory of 208 3700 rundll32.exe 82 PID 3700 wrote to memory of 208 3700 rundll32.exe 82 PID 3700 wrote to memory of 208 3700 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a86d0297e160d47a6531b05f4dd9916ac685bb284728f870d83c66fd29e5006b.dll,#12⤵PID:208
-