Analysis
-
max time kernel
93s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
310013941d447cfc320ce410a880392b05a0986bff8e8c449e1a0f413020f31b.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
310013941d447cfc320ce410a880392b05a0986bff8e8c449e1a0f413020f31b.dll
Resource
win10v2004-20240508-en
General
-
Target
310013941d447cfc320ce410a880392b05a0986bff8e8c449e1a0f413020f31b.dll
-
Size
2.5MB
-
MD5
f0fb3e42854cebfea2da182afebf47af
-
SHA1
b63493ed583b9aec2096a79152a1447e667830d5
-
SHA256
310013941d447cfc320ce410a880392b05a0986bff8e8c449e1a0f413020f31b
-
SHA512
4ef3d5bfe691e51333762be4f601276ce2bb443e7afba85b0d217399aacd9a8e1d248de6971b9c9dd159ef183fa448895a6e6421a0fb811ee8cf3f8c126b759e
-
SSDEEP
49152:Fgi3PmnDiN+0BI/mQNpgAZb40zOaoiOPUGWbmKL4:R3PmnDeBomYpLZ/zwiOMGWf
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4140 wrote to memory of 4480 4140 rundll32.exe 81 PID 4140 wrote to memory of 4480 4140 rundll32.exe 81 PID 4140 wrote to memory of 4480 4140 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\310013941d447cfc320ce410a880392b05a0986bff8e8c449e1a0f413020f31b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\310013941d447cfc320ce410a880392b05a0986bff8e8c449e1a0f413020f31b.dll,#12⤵PID:4480
-