Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2023, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
d423d9561ee260814a94cf900a928ebdee58a80b4937cff448129cc75b02bb6c.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d423d9561ee260814a94cf900a928ebdee58a80b4937cff448129cc75b02bb6c.dll
Resource
win10v2004-20230220-en
General
-
Target
d423d9561ee260814a94cf900a928ebdee58a80b4937cff448129cc75b02bb6c.dll
-
Size
333KB
-
MD5
ee7aa3c633016a673fffdce493fe0fc7
-
SHA1
8f8751d53df8df5dc410e892cd626bdbad45992d
-
SHA256
d423d9561ee260814a94cf900a928ebdee58a80b4937cff448129cc75b02bb6c
-
SHA512
8b56a09de7a0e1c774723af672033a928c18a47680d749aba77619852c201eb6842757f664b4cc620d8bb10cacf092378b7c9c8d13e4e7fe497d3dacdd19f4a2
-
SSDEEP
6144:Fr9CHTZ0Sst7RYHEjbWiRACOKTXpCCd30fo/yh03GMyqqNJXcNL2e:Fr9S0btaEjbWxGoC10Syh05y9NJXcN
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4952 wrote to memory of 952 4952 rundll32.exe 84 PID 4952 wrote to memory of 952 4952 rundll32.exe 84 PID 4952 wrote to memory of 952 4952 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d423d9561ee260814a94cf900a928ebdee58a80b4937cff448129cc75b02bb6c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d423d9561ee260814a94cf900a928ebdee58a80b4937cff448129cc75b02bb6c.dll,#12⤵PID:952
-