Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
9c8c5e2127adc1e6bf013faf1de6ee7bd736a8cd3ca0114dace845fd3eec5f35.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9c8c5e2127adc1e6bf013faf1de6ee7bd736a8cd3ca0114dace845fd3eec5f35.dll
Resource
win10v2004-20230220-en
General
-
Target
9c8c5e2127adc1e6bf013faf1de6ee7bd736a8cd3ca0114dace845fd3eec5f35.dll
-
Size
176KB
-
MD5
a7c7dc15d84b0807fe266ddac5838647
-
SHA1
b249e546ed2f33479b10d4b7a993f263b4c8c459
-
SHA256
9c8c5e2127adc1e6bf013faf1de6ee7bd736a8cd3ca0114dace845fd3eec5f35
-
SHA512
779ebc3dac7c594d5fd3b193d4756a1dae8e509118522b56970ae018b4152874d032a252604c002f39d4eb8eef147d51383f581842b3f9c8c3d56e1290b82cec
-
SSDEEP
3072:PdSxX46ho8GNBCFFEZX8YDt6PJmcy1jxNkczzyBzjoTl9jAF2:lSOERxEt8/Ic4jx6qzyx2
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4168 wrote to memory of 1484 4168 rundll32.exe 85 PID 4168 wrote to memory of 1484 4168 rundll32.exe 85 PID 4168 wrote to memory of 1484 4168 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c8c5e2127adc1e6bf013faf1de6ee7bd736a8cd3ca0114dace845fd3eec5f35.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c8c5e2127adc1e6bf013faf1de6ee7bd736a8cd3ca0114dace845fd3eec5f35.dll,#12⤵PID:1484
-