Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 12:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c245dc27df475ed07c170e48fa067680N.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
General
-
Target
c245dc27df475ed07c170e48fa067680N.dll
-
Size
807KB
-
MD5
c245dc27df475ed07c170e48fa067680
-
SHA1
127db070e6822aa17522be163f5c1a0ec4948bb8
-
SHA256
71bb83cc504a55897df953eb6be31d973456b9631fac854aa5970eebd023cf9b
-
SHA512
bb00d6a7676d707e2572174964108d6212b86f8806a12bc5f66798cb3f9cc7a59e7cd14f8400cf45acd3e85d34f2908563cffa1a15ce48cc85a5e7fcce1c0a9c
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYd:o6RI1Fo/wT3cJYYYYYYYYYYYYd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3872 wrote to memory of 4328 3872 rundll32.exe 84 PID 3872 wrote to memory of 4328 3872 rundll32.exe 84 PID 3872 wrote to memory of 4328 3872 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c245dc27df475ed07c170e48fa067680N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c245dc27df475ed07c170e48fa067680N.dll,#12⤵PID:4328
-