Analysis
-
max time kernel
121s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
f6ea4d9d926b29b8c36f7e2c4c20aa9e953bbfb30da53f1319c7d71f1fa707fd.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f6ea4d9d926b29b8c36f7e2c4c20aa9e953bbfb30da53f1319c7d71f1fa707fd.dll
Resource
win10v2004-20230220-en
General
-
Target
f6ea4d9d926b29b8c36f7e2c4c20aa9e953bbfb30da53f1319c7d71f1fa707fd.dll
-
Size
1.4MB
-
MD5
f7bdac9cf370a6facc30ee54085a433d
-
SHA1
41c2a02c70932fca9989a8056c42b976a591c135
-
SHA256
f6ea4d9d926b29b8c36f7e2c4c20aa9e953bbfb30da53f1319c7d71f1fa707fd
-
SHA512
97ca53987d824ed2fa28a308d81f580f3ff29037e9aa8ac7cf060132f68d86e4079c937d4aaf1ea7abe781358c71dc5318a10b6e1b655bb1df36075479622124
-
SSDEEP
24576:pQ9dPbReCqIcpVUk268DVOTVUb6fGVy6ABeYu8sq0R3Nt8LtHVo2fHQBL:AgCqIGN2RVOTVUb61Bh0R3sBwBL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3448 wrote to memory of 4272 3448 rundll32.exe 85 PID 3448 wrote to memory of 4272 3448 rundll32.exe 85 PID 3448 wrote to memory of 4272 3448 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f6ea4d9d926b29b8c36f7e2c4c20aa9e953bbfb30da53f1319c7d71f1fa707fd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f6ea4d9d926b29b8c36f7e2c4c20aa9e953bbfb30da53f1319c7d71f1fa707fd.dll,#12⤵PID:4272
-