Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
d831bc7358068383504ff9899204d1a4ff15b4401209abd1dd1b63f8c23655fb.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d831bc7358068383504ff9899204d1a4ff15b4401209abd1dd1b63f8c23655fb.dll
Resource
win10v2004-20240508-en
General
-
Target
d831bc7358068383504ff9899204d1a4ff15b4401209abd1dd1b63f8c23655fb.dll
-
Size
2.1MB
-
MD5
a20d8a2e0ba1b1967c7da44447fc5d64
-
SHA1
20994f0042a4401839df54cb9a8fb3c840916e08
-
SHA256
d831bc7358068383504ff9899204d1a4ff15b4401209abd1dd1b63f8c23655fb
-
SHA512
671bfddd894d899c80c8d2f3c44a3663cb93880f0ba389687e534be3c50a4dda04cc977bacd8db07e531b7c21185e64cad36c699b6ad2a21144878383d864498
-
SSDEEP
49152:SntxO/JnqDrjCFFtcmpFhKCKiUT8mTQ8O:SntwRnqDr2FFtc2FhKCKiUT8H
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4736 wrote to memory of 4012 4736 rundll32.exe 82 PID 4736 wrote to memory of 4012 4736 rundll32.exe 82 PID 4736 wrote to memory of 4012 4736 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d831bc7358068383504ff9899204d1a4ff15b4401209abd1dd1b63f8c23655fb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d831bc7358068383504ff9899204d1a4ff15b4401209abd1dd1b63f8c23655fb.dll,#12⤵PID:4012
-