Analysis
-
max time kernel
18s -
max time network
22s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05/08/2024, 09:49
Behavioral task
behavioral1
Sample
Voltage.dll
Resource
win11-20240802-en
3 signatures
60 seconds
General
-
Target
Voltage.dll
-
Size
6.5MB
-
MD5
6573ce7970405983186828a58288ff53
-
SHA1
e1c5abfb07a20dfd23d244c69d7ec4c5a880aaf4
-
SHA256
0d20e777de144bc47062c083bbb8e20c2c504c989ebcc7c97c2833c255a6da48
-
SHA512
4f0d9ad54a3473a9cc13ab36dcbdf5b423a872a01169e6bddd2821459005dab2fccbe035c2d6146a4836a22a4c9822183c6ed5ab0630b188ed2d5cd753516777
-
SSDEEP
196608:YN6KheqIwhuvk0dY17DEcWfTVZjpZ6e/a4QSIt/hj:YN6KhekhuvkGOUrTZzy4MZ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1732-3-0x00007FFA63780000-0x00007FFA645D2000-memory.dmp vmprotect behavioral1/memory/1732-8-0x00007FFA63780000-0x00007FFA645D2000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1732 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1732 rundll32.exe 1732 rundll32.exe