Analysis
-
max time kernel
90s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/07/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
e372b03883a1a30eed3fe4bf996fc7d352aba64ea5d46eed96033d342856a64c.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
e372b03883a1a30eed3fe4bf996fc7d352aba64ea5d46eed96033d342856a64c.dll
Resource
win11-20240709-en
General
-
Target
e372b03883a1a30eed3fe4bf996fc7d352aba64ea5d46eed96033d342856a64c.dll
-
Size
3.3MB
-
MD5
981bb0a3ae10a0e3850f31bd972c59fa
-
SHA1
0bb35cbed91fd8f50fe38fdb3ded8f63654f88f0
-
SHA256
e372b03883a1a30eed3fe4bf996fc7d352aba64ea5d46eed96033d342856a64c
-
SHA512
18f7b95130ed5eb0e4a1151c92087cb1f3ba1d823397392087c80fee4b1f147620f9a407779987b5f9ffb4a2319fde2017affa0da1e5576938bf4f141941011a
-
SSDEEP
49152:eaO2Sy762+RWJx9uUHSTzusoIbmls963fTmBSEh5uewAZQ33ESQ:giW2pf9XSTzHh6m963fqueZ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4616 wrote to memory of 3308 4616 rundll32.exe 78 PID 4616 wrote to memory of 3308 4616 rundll32.exe 78 PID 4616 wrote to memory of 3308 4616 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e372b03883a1a30eed3fe4bf996fc7d352aba64ea5d46eed96033d342856a64c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e372b03883a1a30eed3fe4bf996fc7d352aba64ea5d46eed96033d342856a64c.dll,#12⤵PID:3308
-