Analysis
-
max time kernel
141s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2023, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
4061b4a37de72a0c0e00231e946eb6e7b3701dee58c2470b2ff456df59964768.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4061b4a37de72a0c0e00231e946eb6e7b3701dee58c2470b2ff456df59964768.dll
Resource
win10v2004-20230220-en
General
-
Target
4061b4a37de72a0c0e00231e946eb6e7b3701dee58c2470b2ff456df59964768.dll
-
Size
17KB
-
MD5
7ade91f091bcf7623a01da3e92279467
-
SHA1
f1d172dfd5f970c459c8a622bab198801f55c372
-
SHA256
4061b4a37de72a0c0e00231e946eb6e7b3701dee58c2470b2ff456df59964768
-
SHA512
b2bfc17346eda232ff2de86a6a25eef8b76e4bb97669d4c9a90f5ea8122353fa5c42d1da70b730ddd26807dcf80efad433aa232b7a42fea0beac410a74a0cbe3
-
SSDEEP
192:nDqeRwdb3enG2RxnSGzTcb7dYMnW0TYxm2pXEz4JWaULI7kbSHkFQc3psZ/Q99g7:DqzdeGQ/TcFPnW0wp0tekWo5s5eGZvXx
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4644 4232 rundll32.exe 84 PID 4232 wrote to memory of 4644 4232 rundll32.exe 84 PID 4232 wrote to memory of 4644 4232 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4061b4a37de72a0c0e00231e946eb6e7b3701dee58c2470b2ff456df59964768.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4061b4a37de72a0c0e00231e946eb6e7b3701dee58c2470b2ff456df59964768.dll,#12⤵PID:4644
-