Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2023, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
5d8fb9f6dc949f25fbbe23afe7a74dd6b8acf945105a576425c73b8fb015d6b6.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5d8fb9f6dc949f25fbbe23afe7a74dd6b8acf945105a576425c73b8fb015d6b6.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
5d8fb9f6dc949f25fbbe23afe7a74dd6b8acf945105a576425c73b8fb015d6b6.dll
-
Size
64KB
-
MD5
5c14b1f4e17074354d508097ed784e5f
-
SHA1
3566ee093ce3878858a55731f9b0a975f80d17d9
-
SHA256
5d8fb9f6dc949f25fbbe23afe7a74dd6b8acf945105a576425c73b8fb015d6b6
-
SHA512
6339e4c7f1988feb77cd5bc38305bc876b044338fe1653e54669ef9e33abed555cc8948b8429da883ae32ce78fd83d385dc916d20c111eba7a5a9804fecf727c
-
SSDEEP
1536:ErOiV4n8GfCHzw5ftBUWtY17ojHlfisI:Rs4nNCTeB1Y17or
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 448 wrote to memory of 644 448 rundll32.exe 81 PID 448 wrote to memory of 644 448 rundll32.exe 81 PID 448 wrote to memory of 644 448 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d8fb9f6dc949f25fbbe23afe7a74dd6b8acf945105a576425c73b8fb015d6b6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d8fb9f6dc949f25fbbe23afe7a74dd6b8acf945105a576425c73b8fb015d6b6.dll,#12⤵PID:644
-