Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 05:56
Static task
static1
Behavioral task
behavioral1
Sample
dccc00d06b753be102e5423d6293a21260fb91e610f69eb5b4760a428d1b63af.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
dccc00d06b753be102e5423d6293a21260fb91e610f69eb5b4760a428d1b63af.dll
Resource
win10v2004-20240611-en
General
-
Target
dccc00d06b753be102e5423d6293a21260fb91e610f69eb5b4760a428d1b63af.dll
-
Size
534KB
-
MD5
bf0d967c80273287334991331a4a5dca
-
SHA1
0deae4f1f939fc33f8fa7ccec63122163325b5d0
-
SHA256
dccc00d06b753be102e5423d6293a21260fb91e610f69eb5b4760a428d1b63af
-
SHA512
39e704ad27b7f26b624b7c755cc1d12349015dfe76e383526c24e48e67c53e6035ec1c09de402032f76f3e581a06bafb8d6ba110d23668b384ce368eb50b6e57
-
SSDEEP
6144:J2BsUVUPgprVs+UiM0UGTZkR2UQ+SVVs/tj5x4agKBKZGV/I23yBRjyMbY3qxXq:asUVUI/pUiDkJQUjx4agiFziBR2Mjf
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 1500 4440 rundll32.exe 82 PID 4440 wrote to memory of 1500 4440 rundll32.exe 82 PID 4440 wrote to memory of 1500 4440 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dccc00d06b753be102e5423d6293a21260fb91e610f69eb5b4760a428d1b63af.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dccc00d06b753be102e5423d6293a21260fb91e610f69eb5b4760a428d1b63af.dll,#12⤵PID:1500
-