Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 07:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8370ce6477c987e921dbea688f8abc20N.dll
Resource
win7-20240705-en
windows7-x64
2 signatures
120 seconds
General
-
Target
8370ce6477c987e921dbea688f8abc20N.dll
-
Size
705KB
-
MD5
8370ce6477c987e921dbea688f8abc20
-
SHA1
15bc64ff126f72d7dae3ff08f3bc0b776c683d5d
-
SHA256
f82ac5fdd56256de80f8fd57abfabd87ca69b852c1fc23bf3eac479d862c28c0
-
SHA512
e49f225dbf390e8df8af1ffd38a7ff18572468659b6a4de931f7237457407afc6b7721a87e780830748782fd603cdf4e5b265007313ec3ca5a105afb179c3cfb
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYm:o6RI1Fo/wT3cJYYYYYYYYYYYYm
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1400 2116 rundll32.exe 86 PID 2116 wrote to memory of 1400 2116 rundll32.exe 86 PID 2116 wrote to memory of 1400 2116 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8370ce6477c987e921dbea688f8abc20N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8370ce6477c987e921dbea688f8abc20N.dll,#12⤵PID:1400
-