Analysis
-
max time kernel
58s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
12/04/2023, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.dll
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.dll
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.dll
Resource
win10v2004-20230220-en
General
-
Target
1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.dll
-
Size
64KB
-
MD5
f351e1fcca0c4ea05fc44d15a17f8b36
-
SHA1
7d36a6aa8cb6b504ee9213c200c831eb8d4ef26b
-
SHA256
1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830
-
SHA512
c139bddae3571cac3d832535e0c3bc6d817b86fb3f7b68864d1b94e9c37b38856f2eeeb49c16f2fb8fee45e6a7c95bc67072443b7428034b6def10d3f724ca22
-
SSDEEP
768:edWOTdghGl7Lu/qGrN5r5UF9sBaho9S4AJKqBz8MZK8IgpkCamlniZfO:PGdghGleSGh5resN9S4A3jHaqniZfO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 372 wrote to memory of 3960 372 rundll32.exe 66 PID 372 wrote to memory of 3960 372 rundll32.exe 66 PID 372 wrote to memory of 3960 372 rundll32.exe 66
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.dll,#12⤵PID:3960
-