Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2024 03:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5d34e5ac8913333b897e7e956eb240f0N.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
General
-
Target
5d34e5ac8913333b897e7e956eb240f0N.dll
-
Size
1.0MB
-
MD5
5d34e5ac8913333b897e7e956eb240f0
-
SHA1
05f20ab60b860fdcdf0c0cb4b536379cf56d6cc3
-
SHA256
621fcdc2d7d7fddde3f2206d7c856cc23ff5440e8e10f16f4f00c1f29514e6cf
-
SHA512
523a7f8f1318af518297a8044aa6bb019ed88cd9da12fb2bc117299c9185ab6815379fd459d1276e1a700d6c535a01bbe73a2b2f031c3423ff5492b61ae98d34
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYq:o6RI1Fo/wT3cJYYYYYYYYYYYYq
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2792 2784 rundll32.exe 84 PID 2784 wrote to memory of 2792 2784 rundll32.exe 84 PID 2784 wrote to memory of 2792 2784 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d34e5ac8913333b897e7e956eb240f0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d34e5ac8913333b897e7e956eb240f0N.dll,#12⤵PID:2792
-