Analysis
-
max time kernel
195s -
max time network
257s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-06-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
2e83781f52db4831b34074210d2727560d14ce9e2c88246f214fac3d3a3f7b53.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2e83781f52db4831b34074210d2727560d14ce9e2c88246f214fac3d3a3f7b53.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
2e83781f52db4831b34074210d2727560d14ce9e2c88246f214fac3d3a3f7b53.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2e83781f52db4831b34074210d2727560d14ce9e2c88246f214fac3d3a3f7b53.dll
Resource
win11-20240419-en
General
-
Target
2e83781f52db4831b34074210d2727560d14ce9e2c88246f214fac3d3a3f7b53.dll
-
Size
741KB
-
MD5
d76ee4f0ddbe2bd93c67a340c6c0a75c
-
SHA1
ab1a289cdddeab2388723afc8c48c8e8c76e1aa1
-
SHA256
2e83781f52db4831b34074210d2727560d14ce9e2c88246f214fac3d3a3f7b53
-
SHA512
24f99aa1d56e939479dcd08c93a3369e6f3793e121baa72860ba172ad5c08e1f964ee319249e2f969601604915025e0e2f1ea58b467a715c93d73ec8a23527b2
-
SSDEEP
6144:Pzpd1exLXnz/hqqD3Qg+1obZDV41UA5UB:7pd1yLnz0qjy1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4812 wrote to memory of 4772 4812 rundll32.exe 73 PID 4812 wrote to memory of 4772 4812 rundll32.exe 73 PID 4812 wrote to memory of 4772 4812 rundll32.exe 73
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e83781f52db4831b34074210d2727560d14ce9e2c88246f214fac3d3a3f7b53.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e83781f52db4831b34074210d2727560d14ce9e2c88246f214fac3d3a3f7b53.dll,#12⤵PID:4772
-