Analysis
-
max time kernel
131s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
cac71cb303a8c1c4807ae18a3592cf6b9dccd6a6f6d42da2662bf2f7e25afd7d.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
cac71cb303a8c1c4807ae18a3592cf6b9dccd6a6f6d42da2662bf2f7e25afd7d.dll
Resource
win10v2004-20240611-en
General
-
Target
cac71cb303a8c1c4807ae18a3592cf6b9dccd6a6f6d42da2662bf2f7e25afd7d.dll
-
Size
569KB
-
MD5
14f0b6a810adf6023bc019805d358945
-
SHA1
6d9f7f80c6e97b0c77e1aae1c086036fd5811a87
-
SHA256
cac71cb303a8c1c4807ae18a3592cf6b9dccd6a6f6d42da2662bf2f7e25afd7d
-
SHA512
c0b2cdb34b3304409cf3840dccf2e5200f0c63a2ee14afeddec5c5cff69c93522ae6cc4b3bff23d892cbd0c67c8406e8d785faeef6ba2c13ffc4d4f425ea81c5
-
SSDEEP
6144:DTUH+XfjP42HQYMMJjD0lXEikwePdSQjwqeK5:EH+XjDMAjolXEikw85
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 4172 2224 rundll32.exe 83 PID 2224 wrote to memory of 4172 2224 rundll32.exe 83 PID 2224 wrote to memory of 4172 2224 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cac71cb303a8c1c4807ae18a3592cf6b9dccd6a6f6d42da2662bf2f7e25afd7d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cac71cb303a8c1c4807ae18a3592cf6b9dccd6a6f6d42da2662bf2f7e25afd7d.dll,#12⤵PID:4172
-