Analysis
-
max time kernel
94s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
516b9dbfd4406a25847623e39eab237b5173ff90eccf3c4c82ceb964e05e6cc1.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
516b9dbfd4406a25847623e39eab237b5173ff90eccf3c4c82ceb964e05e6cc1.dll
Resource
win10v2004-20240426-en
General
-
Target
516b9dbfd4406a25847623e39eab237b5173ff90eccf3c4c82ceb964e05e6cc1.dll
-
Size
522KB
-
MD5
7d438c174dad956499554a555727491d
-
SHA1
41695514e59db44a4afbacbe479d3b186907b630
-
SHA256
516b9dbfd4406a25847623e39eab237b5173ff90eccf3c4c82ceb964e05e6cc1
-
SHA512
7790e91e53040c723840e9819bf3ae434700897b69da27c7a633a3e359ef0dd04f0b409eca16f29653ccae170318bdd28d066a31e1892c6078ee6f1816b631cf
-
SSDEEP
12288:Kvtq2DS651iRMFpj/18xmPAT1k6RAlNcQsvqsVGzh3iX/:Kvtq2DS65/paxmPAT1k6RUN2qCKO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 3204 4424 rundll32.exe 81 PID 4424 wrote to memory of 3204 4424 rundll32.exe 81 PID 4424 wrote to memory of 3204 4424 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\516b9dbfd4406a25847623e39eab237b5173ff90eccf3c4c82ceb964e05e6cc1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\516b9dbfd4406a25847623e39eab237b5173ff90eccf3c4c82ceb964e05e6cc1.dll,#12⤵PID:3204
-