Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
23d87fae5320f66f05f438702321539653d47db2bcbc1f0edb766ee06d25bb10.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
23d87fae5320f66f05f438702321539653d47db2bcbc1f0edb766ee06d25bb10.dll
Resource
win10v2004-20220901-en
General
-
Target
23d87fae5320f66f05f438702321539653d47db2bcbc1f0edb766ee06d25bb10.dll
-
Size
48KB
-
MD5
200af02a5fbe4b7d39205764321d4d5e
-
SHA1
5ce5b5345e1f65acb140962f2526583f5ba30a45
-
SHA256
23d87fae5320f66f05f438702321539653d47db2bcbc1f0edb766ee06d25bb10
-
SHA512
4601b5c2a0308178701e0ddb36cf6263e872046c814fe9175b12d96491cb5d281c611281b4ddd8959df279e2c44c032097a4cd1d190c3f2bf4f2988e2c6b10b9
-
SSDEEP
768:oriykWA6AXQuLlg7kZHOYQOxH766rDakrL+VaG7SbetwyOyXo9ga1:or4Xz5g76OcO6Cpa9s3PoN1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1688 wrote to memory of 4040 1688 rundll32.exe 81 PID 1688 wrote to memory of 4040 1688 rundll32.exe 81 PID 1688 wrote to memory of 4040 1688 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23d87fae5320f66f05f438702321539653d47db2bcbc1f0edb766ee06d25bb10.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23d87fae5320f66f05f438702321539653d47db2bcbc1f0edb766ee06d25bb10.dll,#12⤵PID:4040
-