Analysis
-
max time kernel
102s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2023, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
d6031f52efe431e80ef29e1da189924e47745a7cc9372831447826955b6c40da.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d6031f52efe431e80ef29e1da189924e47745a7cc9372831447826955b6c40da.dll
Resource
win10v2004-20230220-en
General
-
Target
d6031f52efe431e80ef29e1da189924e47745a7cc9372831447826955b6c40da.dll
-
Size
338KB
-
MD5
25c299c12fa10d508bf4bad2b36ff444
-
SHA1
c4e5cc8e261b95b5f474547422308234eaa703c7
-
SHA256
d6031f52efe431e80ef29e1da189924e47745a7cc9372831447826955b6c40da
-
SHA512
5b8deb4ccab4aa1661b5920c75e656f8bdd65a70285e877855774abb68cee2faf051048f57ebb19878bdba1382abeb6f26380b8a06e47f885a50ffc0764e2b5f
-
SSDEEP
6144:rGpptTq76Et/NPHn1PdjxFJwMoW9vTWF5K6bVt2Eyfs/nqlbbHyx2f8qo+AwrOc:rG7Nq76qPVltfTvTWF5K6zPyfsyZ+x25
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1324 2172 rundll32.exe 80 PID 2172 wrote to memory of 1324 2172 rundll32.exe 80 PID 2172 wrote to memory of 1324 2172 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6031f52efe431e80ef29e1da189924e47745a7cc9372831447826955b6c40da.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6031f52efe431e80ef29e1da189924e47745a7cc9372831447826955b6c40da.dll,#12⤵PID:1324
-