Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 11:53
Behavioral task
behavioral1
Sample
8ffca50cb3724f03e72974c6bd16061258cfaee595665f2797d952b0f8d93842.dll
Resource
win7-20240419-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
8ffca50cb3724f03e72974c6bd16061258cfaee595665f2797d952b0f8d93842.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
8ffca50cb3724f03e72974c6bd16061258cfaee595665f2797d952b0f8d93842.dll
-
Size
2.3MB
-
MD5
db6614bfdf4e5b3457559382c73cb180
-
SHA1
3d31ba7e0f12a66fe25280f68e28f50a9da674c7
-
SHA256
8ffca50cb3724f03e72974c6bd16061258cfaee595665f2797d952b0f8d93842
-
SHA512
0105b82beab0e39243c6feb96391130e172cf9fff6c2d0d1800e889f2659d921b1a8cda5465bc727824f1a782edd05a437041a84b24d7d1174795417893e7b12
-
SSDEEP
49152:xTMNIjOjHaFbK9ur55wj7LVL727KktC0ZDL4Th2t3RS2RRCHX0Hg:NFjOj9gILVL727g0gqRzMH
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2968-0-0x00000000743F0000-0x0000000074A0E000-memory.dmp themida -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 896 wrote to memory of 2968 896 rundll32.exe 81 PID 896 wrote to memory of 2968 896 rundll32.exe 81 PID 896 wrote to memory of 2968 896 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ffca50cb3724f03e72974c6bd16061258cfaee595665f2797d952b0f8d93842.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ffca50cb3724f03e72974c6bd16061258cfaee595665f2797d952b0f8d93842.dll,#12⤵PID:2968
-