Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2023, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
233843a326194da22ab356f0f4a37b9daf8dfc163749c500b741904743456f4c.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
233843a326194da22ab356f0f4a37b9daf8dfc163749c500b741904743456f4c.dll
Resource
win10v2004-20230220-en
General
-
Target
233843a326194da22ab356f0f4a37b9daf8dfc163749c500b741904743456f4c.dll
-
Size
471KB
-
MD5
f88286dcb4d75fa2f0b0628d6ed71779
-
SHA1
27a621ac5f23f358bc2c430e42cf72d545bea609
-
SHA256
233843a326194da22ab356f0f4a37b9daf8dfc163749c500b741904743456f4c
-
SHA512
ec430e730ed5f20fb94ffacf9e4e63b3c198ea6e0a734c672606631f788c8e776c8df2a2fac4b4887eb9d1c917cb314429c302e5a7ea9cd1aa169b69255701c3
-
SSDEEP
12288:hcv7/Y4V9IR6k7XrTCpCPomc/lEDc/BDB4q:e7/Y47IR6k7HCp9mcNEUBDB4
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4496 wrote to memory of 4492 4496 rundll32.exe 83 PID 4496 wrote to memory of 4492 4496 rundll32.exe 83 PID 4496 wrote to memory of 4492 4496 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\233843a326194da22ab356f0f4a37b9daf8dfc163749c500b741904743456f4c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\233843a326194da22ab356f0f4a37b9daf8dfc163749c500b741904743456f4c.dll,#12⤵PID:4492
-