Analysis
-
max time kernel
61s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
97eabe9f7c8742c2960fd48f83b88d781b856cb64cb0a09f07e3fe7dbf2c439d.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
97eabe9f7c8742c2960fd48f83b88d781b856cb64cb0a09f07e3fe7dbf2c439d.dll
Resource
win10v2004-20230220-en
General
-
Target
97eabe9f7c8742c2960fd48f83b88d781b856cb64cb0a09f07e3fe7dbf2c439d.dll
-
Size
956KB
-
MD5
674bfb0ced4cbfde985cc01d86fa87b5
-
SHA1
ba064f71d43c172590aaef2c8dfcffca2b93ec31
-
SHA256
97eabe9f7c8742c2960fd48f83b88d781b856cb64cb0a09f07e3fe7dbf2c439d
-
SHA512
01aba7aec8eb4d2dfe0539790933446629f0c1bc1dbbff467bfd831472b4093423bc9b2138e7e77298456eafec9f8f09f9aa06298f0e718a9f9446bef9a45ce2
-
SSDEEP
12288:z6AeJYCzk2ivae9B912cwMIORfGBuSs63AjwxvTHpDRd8lNIrXjvA0fzJm3OE3eB:z6A02ae9BrP
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2160 1668 rundll32.exe 85 PID 1668 wrote to memory of 2160 1668 rundll32.exe 85 PID 1668 wrote to memory of 2160 1668 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\97eabe9f7c8742c2960fd48f83b88d781b856cb64cb0a09f07e3fe7dbf2c439d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\97eabe9f7c8742c2960fd48f83b88d781b856cb64cb0a09f07e3fe7dbf2c439d.dll,#12⤵PID:2160
-