Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
8503a1f5cb8754ce4f765b9c02cf1e2d92463cf9a7603d65812cbc2a83a6d8ec.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8503a1f5cb8754ce4f765b9c02cf1e2d92463cf9a7603d65812cbc2a83a6d8ec.dll
Resource
win10v2004-20240704-en
General
-
Target
8503a1f5cb8754ce4f765b9c02cf1e2d92463cf9a7603d65812cbc2a83a6d8ec.dll
-
Size
2.7MB
-
MD5
9afa42b10a388290fd7c9cec01f2ecf4
-
SHA1
6bbf75d373d02903457b64cde00dfe28236d81c6
-
SHA256
8503a1f5cb8754ce4f765b9c02cf1e2d92463cf9a7603d65812cbc2a83a6d8ec
-
SHA512
37b7ea9acf4bd83b3be901e9e331f9e6446281cb790c46b41aa5df8bbb1e9cbe42501d0fe14e98d9225098b4468d3545c4346c2d153d2db191e2ac8d88b8bbd5
-
SSDEEP
49152:PefXXwtIIReQZ3zUb3evpt8w+7inh5hHplgXD3mSev11Z:2fXXKllk3PTQ5hJlgCT
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4940 wrote to memory of 4716 4940 rundll32.exe 82 PID 4940 wrote to memory of 4716 4940 rundll32.exe 82 PID 4940 wrote to memory of 4716 4940 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8503a1f5cb8754ce4f765b9c02cf1e2d92463cf9a7603d65812cbc2a83a6d8ec.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8503a1f5cb8754ce4f765b9c02cf1e2d92463cf9a7603d65812cbc2a83a6d8ec.dll,#12⤵PID:4716
-