Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2023, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
8203e94516d2c61ff3c14d1117a4caa6a4b927a08f3da41fe2afb1b1e9d47275.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8203e94516d2c61ff3c14d1117a4caa6a4b927a08f3da41fe2afb1b1e9d47275.dll
Resource
win10v2004-20230221-en
General
-
Target
8203e94516d2c61ff3c14d1117a4caa6a4b927a08f3da41fe2afb1b1e9d47275.dll
-
Size
213KB
-
MD5
39b8039ee440a9c26a49c4931783de21
-
SHA1
2775f20972a9d51e81982c5465f4b0c2adee68eb
-
SHA256
8203e94516d2c61ff3c14d1117a4caa6a4b927a08f3da41fe2afb1b1e9d47275
-
SHA512
826ee267b2664cea5a50c29c53d4c94591c233cea05f0ae7f8f4c9c091157038c37d140e6d96419fb56dbf221860c8cc4b66c16b6f2d3817763dfa0c3ab1b28f
-
SSDEEP
3072:L5Np2dlUX0+Cx17F8QRJZKmOK3outKdpz7miJVD/mplcVigaY5mSEoDX:tFwT7SMJMzUoS+pzfbbmpJ/U
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2128 1748 rundll32.exe 82 PID 1748 wrote to memory of 2128 1748 rundll32.exe 82 PID 1748 wrote to memory of 2128 1748 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8203e94516d2c61ff3c14d1117a4caa6a4b927a08f3da41fe2afb1b1e9d47275.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8203e94516d2c61ff3c14d1117a4caa6a4b927a08f3da41fe2afb1b1e9d47275.dll,#12⤵PID:2128
-