Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
488176647918de2fa10acb2ac9cdf5b259b7cbcb20654608d81e14c7d8445a01.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
488176647918de2fa10acb2ac9cdf5b259b7cbcb20654608d81e14c7d8445a01.dll
Resource
win10v2004-20240611-en
General
-
Target
488176647918de2fa10acb2ac9cdf5b259b7cbcb20654608d81e14c7d8445a01.dll
-
Size
6KB
-
MD5
b02ad2af91e88ac74691079fc7aceace
-
SHA1
9b8f5b3980cf0f4bc95eabf48e78c241ec889dc0
-
SHA256
488176647918de2fa10acb2ac9cdf5b259b7cbcb20654608d81e14c7d8445a01
-
SHA512
d4d99560d9bf121a5e94874128e964290bd646ecfe0ac96629c7a1a2ad721f4c56055f7a85ec3a0e83ec3ae28c07f5b1debd1e1f4cc87b6f383e2b1d4047be46
-
SSDEEP
96:hy859x0P8Mak5tUZr8MFsBYuki66DA5rMBqNF01Q7o:F5oL1cldZc6gBQ0y7o
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 432 wrote to memory of 4856 432 rundll32.exe 82 PID 432 wrote to memory of 4856 432 rundll32.exe 82 PID 432 wrote to memory of 4856 432 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\488176647918de2fa10acb2ac9cdf5b259b7cbcb20654608d81e14c7d8445a01.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\488176647918de2fa10acb2ac9cdf5b259b7cbcb20654608d81e14c7d8445a01.dll,#12⤵PID:4856
-