Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 06:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4e67c4ab848f50dfb5249690ace517d0.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
General
-
Target
4e67c4ab848f50dfb5249690ace517d0.dll
-
Size
810KB
-
MD5
4e67c4ab848f50dfb5249690ace517d0
-
SHA1
68659d4ed8ce7d4f67b89a45fb858d780b815070
-
SHA256
8d8e6886e49f93b4ea0656a34942af0b124d3bbebae77fa29d787b07be8f65ef
-
SHA512
f32fbd3177b0e624d9489bfd2eae36c0e4f9bfd05b0ad921c399548f88c00b42c2b92edae78f82f260c8476e484276eaafd5d404415868d4f4497f7b94de7b17
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYq:o6RI1Fo/wT3cJYYYYYYYYYYYYq
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1540 wrote to memory of 3808 1540 rundll32.exe 81 PID 1540 wrote to memory of 3808 1540 rundll32.exe 81 PID 1540 wrote to memory of 3808 1540 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4e67c4ab848f50dfb5249690ace517d0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4e67c4ab848f50dfb5249690ace517d0.dll,#12⤵PID:3808
-