Analysis
-
max time kernel
97s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2023 00:31
Behavioral task
behavioral1
Sample
bd9021e21e120d2e7445993718383cb1ae053d1e021b5bd38f4c2c70e369f9a9.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bd9021e21e120d2e7445993718383cb1ae053d1e021b5bd38f4c2c70e369f9a9.dll
Resource
win10v2004-20230220-en
General
-
Target
bd9021e21e120d2e7445993718383cb1ae053d1e021b5bd38f4c2c70e369f9a9.dll
-
Size
60KB
-
MD5
e14642fbc0f1476e66c3735db66c5818
-
SHA1
0b2261d0c6c2210b55ee2fe3c9647593c9f9310f
-
SHA256
bd9021e21e120d2e7445993718383cb1ae053d1e021b5bd38f4c2c70e369f9a9
-
SHA512
c5f3e1882a94e275f5bc74b8a0655f448e506e8fe97c0f795c4d9a2587e03a72cfb491a2cdaed09f3fe615dd954151dc585638ac63f024299d880131d8c11dcc
-
SSDEEP
1536:uaxdndhzVFIZiVjqdPnd+rjlwWEHgQqh2//tcgAw1qS2z9JxF3aURBS64T9D3pd4:uaxBbp+ZiVGdPnd+rjlwWEHgQqh2//tM
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1300 rundll32.exe 1300 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1368 wrote to memory of 1300 1368 rundll32.exe rundll32.exe PID 1368 wrote to memory of 1300 1368 rundll32.exe rundll32.exe PID 1368 wrote to memory of 1300 1368 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd9021e21e120d2e7445993718383cb1ae053d1e021b5bd38f4c2c70e369f9a9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd9021e21e120d2e7445993718383cb1ae053d1e021b5bd38f4c2c70e369f9a9.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300
-