Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
214485fe3b1d483b51acb14985dcb85048023cdc50385bdcc5d9bcdee6cb96e4.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
214485fe3b1d483b51acb14985dcb85048023cdc50385bdcc5d9bcdee6cb96e4.dll
Resource
win10v2004-20240704-en
General
-
Target
214485fe3b1d483b51acb14985dcb85048023cdc50385bdcc5d9bcdee6cb96e4.dll
-
Size
38KB
-
MD5
7e2f8fae9d00e912fe6df1bc834dcfe1
-
SHA1
deeb30b8f91ec8f3597dbfc20890b1b86553a8cf
-
SHA256
214485fe3b1d483b51acb14985dcb85048023cdc50385bdcc5d9bcdee6cb96e4
-
SHA512
dc5f0899757a057725fe31e1dcd50c9ecd8a19071ebdbbe4b9058be8ab64a6bec80f628ca4cca95b774a339262ff10ce729dc10095c3993915050bee9623064d
-
SSDEEP
768:q9qR3HuS/Sx0PJPJmIWOfhArthb97PKSKfASkgOQO2cdHZ:l5Hd/CdI7wskgOQBcdHZ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1544 wrote to memory of 4372 1544 rundll32.exe 82 PID 1544 wrote to memory of 4372 1544 rundll32.exe 82 PID 1544 wrote to memory of 4372 1544 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\214485fe3b1d483b51acb14985dcb85048023cdc50385bdcc5d9bcdee6cb96e4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\214485fe3b1d483b51acb14985dcb85048023cdc50385bdcc5d9bcdee6cb96e4.dll,#12⤵PID:4372
-