Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 13:01
Static task
static1
Behavioral task
behavioral1
Sample
0710e041f999015f34bf24ee4ae7726f2a10c3b6d608d60fe42f49b6b9f88385.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
0710e041f999015f34bf24ee4ae7726f2a10c3b6d608d60fe42f49b6b9f88385.dll
Resource
win11-20240709-en
General
-
Target
0710e041f999015f34bf24ee4ae7726f2a10c3b6d608d60fe42f49b6b9f88385.dll
-
Size
2.3MB
-
MD5
c7605995eecccb7c767b71116ac19528
-
SHA1
cc012c031a2b91aa551bf9c53176607bacb2c74b
-
SHA256
0710e041f999015f34bf24ee4ae7726f2a10c3b6d608d60fe42f49b6b9f88385
-
SHA512
f9d1c38adababf48a2ec0b6f7a53b7049db00da38dc604980fa316c0cd2a98b31f23d5423d8f91c8c958e1caad82afd7c48f74074226f401917d16a177aa914d
-
SSDEEP
49152:2TmaUaskk/0Y8YjZaCw/cYKnfsI3C0pyFoNTTzpu4/p:RaccY8AAb/nyfsI31p5NTTzpu4
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3248 wrote to memory of 4904 3248 rundll32.exe 84 PID 3248 wrote to memory of 4904 3248 rundll32.exe 84 PID 3248 wrote to memory of 4904 3248 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0710e041f999015f34bf24ee4ae7726f2a10c3b6d608d60fe42f49b6b9f88385.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0710e041f999015f34bf24ee4ae7726f2a10c3b6d608d60fe42f49b6b9f88385.dll,#12⤵PID:4904
-