Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
5ea3627f84557746c0217bd6a2d8f92a76ef5529510ad95aea900f01094d83e1.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5ea3627f84557746c0217bd6a2d8f92a76ef5529510ad95aea900f01094d83e1.dll
Resource
win10v2004-20240709-en
General
-
Target
5ea3627f84557746c0217bd6a2d8f92a76ef5529510ad95aea900f01094d83e1.dll
-
Size
7.1MB
-
MD5
a821bd0f8c7f6f1e9b7d98addcdc25b7
-
SHA1
80778be2d65aa0dd38f7d86d22614558bb6f5f0f
-
SHA256
5ea3627f84557746c0217bd6a2d8f92a76ef5529510ad95aea900f01094d83e1
-
SHA512
831a54fde1973a2f7258b24769934a4671bebf65d59a9ef6c700acebc487237b2444c27e344742440ce3df4cf007b012902c5e4f0015f60c395465b4d9931241
-
SSDEEP
98304:4che4hvsjnWtSfxZu3WTQwFcgdxUFZ9LWEDctV5jIqB4n0hLXR:4SvsjnWcfxZu6LFUZWEDctVBO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1712 4112 rundll32.exe 83 PID 4112 wrote to memory of 1712 4112 rundll32.exe 83 PID 4112 wrote to memory of 1712 4112 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ea3627f84557746c0217bd6a2d8f92a76ef5529510ad95aea900f01094d83e1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ea3627f84557746c0217bd6a2d8f92a76ef5529510ad95aea900f01094d83e1.dll,#12⤵PID:1712
-