Analysis
-
max time kernel
73s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2023 20:08
Static task
static1
Behavioral task
behavioral1
Sample
d0700a48e1297ad4e08f7031d94f87a50a01fe6d1d7ae5f1f19a5bd213d7af44.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0700a48e1297ad4e08f7031d94f87a50a01fe6d1d7ae5f1f19a5bd213d7af44.dll
Resource
win10v2004-20220901-en
General
-
Target
d0700a48e1297ad4e08f7031d94f87a50a01fe6d1d7ae5f1f19a5bd213d7af44.dll
-
Size
1.2MB
-
MD5
9a0a0b773e479d0352d73f808f98fc6b
-
SHA1
730c7523af72febf6f5e6fccb8f927db1f77e8fb
-
SHA256
d0700a48e1297ad4e08f7031d94f87a50a01fe6d1d7ae5f1f19a5bd213d7af44
-
SHA512
1b8d4c102bc3db1be86ccb8268f9670e27858b3c91aa91f816576231e3eee759228125ba5a60bb6bd648450660f1bc37dd994536983167ab755aecacd24edefd
-
SSDEEP
24576:VMMT4aRDPp9/kj9lkk3UwSVvv+Po5emXvobZkUkEGyiTy7lstAR08xdBJuTINbV/:JBPTolkk32v5X6ZkAJcAR0UJuTINbVQl
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4828 wrote to memory of 4008 4828 rundll32.exe 81 PID 4828 wrote to memory of 4008 4828 rundll32.exe 81 PID 4828 wrote to memory of 4008 4828 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0700a48e1297ad4e08f7031d94f87a50a01fe6d1d7ae5f1f19a5bd213d7af44.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0700a48e1297ad4e08f7031d94f87a50a01fe6d1d7ae5f1f19a5bd213d7af44.dll,#12⤵PID:4008
-