Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
0d10a3c3081f921d192d691d0ad61fa952156ab199c812aa3ad23f4faaeb129e.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0d10a3c3081f921d192d691d0ad61fa952156ab199c812aa3ad23f4faaeb129e.dll
Resource
win10v2004-20240611-en
General
-
Target
0d10a3c3081f921d192d691d0ad61fa952156ab199c812aa3ad23f4faaeb129e.dll
-
Size
7KB
-
MD5
f667406e926217c90cf62f4c65565fa1
-
SHA1
37a960fffc9e6ad3aae427d8fe3cb0ede49c1a8b
-
SHA256
0d10a3c3081f921d192d691d0ad61fa952156ab199c812aa3ad23f4faaeb129e
-
SHA512
1ae2a4d84b29d2a4ca535fa54c82311a4c080458efd1c48478dcdf5f945f653ce41f20b5e3255d6c549b59a81a7934e7058d6407196771583583f642317c9936
-
SSDEEP
48:66ay5YVO3EVkApc2wp8hH1NZn5EquglQ067YbPWnbABbgL3q9J5S2hmc:b3EVkApcX4Hiv0hbPJq3qX5S2hV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2312 5044 rundll32.exe 83 PID 5044 wrote to memory of 2312 5044 rundll32.exe 83 PID 5044 wrote to memory of 2312 5044 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d10a3c3081f921d192d691d0ad61fa952156ab199c812aa3ad23f4faaeb129e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d10a3c3081f921d192d691d0ad61fa952156ab199c812aa3ad23f4faaeb129e.dll,#12⤵PID:2312
-