Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0.dll
Resource
win10v2004-20240611-en
General
-
Target
5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0.dll
-
Size
5KB
-
MD5
7cba43a2bf20029d16ac1c7d0633acab
-
SHA1
ba5575a4688e2f759039774435df6c87fda7da8b
-
SHA256
5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0
-
SHA512
727a53b21698ae9852baaf0605a583f005b181f074875cf38e933fb1ee28abfc5cf4f4545eab790db6be8e9b2f3b91a8ad8eb3e1690da02c0372eaf1ea1589e6
-
SSDEEP
48:C6VonAHso6U7lYa92RrpjwDmetlG95hx+iMHhsdN2CTp999Yg9N10Rh92YSG99k0:nEY2RrF1eqwi4uD58ihGs3uYcR6Q/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4584 wrote to memory of 668 4584 rundll32.exe 83 PID 4584 wrote to memory of 668 4584 rundll32.exe 83 PID 4584 wrote to memory of 668 4584 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5633547f6b0de539145d1a4ab9a3c00eb6121dd313526ee270abb32bd37188b0.dll,#12⤵PID:668
-