Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
8d5cc4314097c3f2fe743e6b85be450f76c75e303d5cf58598f40e80e7f4b8e3.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8d5cc4314097c3f2fe743e6b85be450f76c75e303d5cf58598f40e80e7f4b8e3.dll
Resource
win10v2004-20240508-en
General
-
Target
8d5cc4314097c3f2fe743e6b85be450f76c75e303d5cf58598f40e80e7f4b8e3.dll
-
Size
1.8MB
-
MD5
61b1c5cbce1371fb2c84ce55e537bd97
-
SHA1
3e124d0c02c204abb6d49d7d5e7906126cfd49ff
-
SHA256
8d5cc4314097c3f2fe743e6b85be450f76c75e303d5cf58598f40e80e7f4b8e3
-
SHA512
c6f5a7cf62cfead80d9556deb5401b41c5e116e62ba0bca3816d2377aa1d46768f2d67fd5a3ad7d7fc1369c20bb0ee69273be7e0a18b8c9a2adbc738883ed21c
-
SSDEEP
49152:j3BjSYiE4bJNy6m2AJsmeP0Pq6fUCXmiNADjPuK9:zBjL4by6TAJsmesPzMCXmiNADjP
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3412 2520 rundll32.exe 81 PID 2520 wrote to memory of 3412 2520 rundll32.exe 81 PID 2520 wrote to memory of 3412 2520 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d5cc4314097c3f2fe743e6b85be450f76c75e303d5cf58598f40e80e7f4b8e3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d5cc4314097c3f2fe743e6b85be450f76c75e303d5cf58598f40e80e7f4b8e3.dll,#12⤵PID:3412
-