Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 19:45
Behavioral task
behavioral1
Sample
8ac57a526aa087a6c3fbd0fafe66b27c957e9bdebeb7355b76cd932167d1b9f6.dll
Resource
win7-20230220-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
8ac57a526aa087a6c3fbd0fafe66b27c957e9bdebeb7355b76cd932167d1b9f6.dll
Resource
win10v2004-20230220-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
8ac57a526aa087a6c3fbd0fafe66b27c957e9bdebeb7355b76cd932167d1b9f6.dll
-
Size
51KB
-
MD5
68ace5dcd6e6cada0fd290d49fd4f85f
-
SHA1
7fdbd7ff628c6e22f45afacb67dcc0779f7a0291
-
SHA256
8ac57a526aa087a6c3fbd0fafe66b27c957e9bdebeb7355b76cd932167d1b9f6
-
SHA512
474f20e5ad088a3a135f6b4fb2fa8084442351ef2d8f330e7280877a0454f53e64be2c213656513de26cc7d511a2ef91140da8d2ef292a4d5623ab4f61c2ed49
-
SSDEEP
1536:GDAfv/rjhIuYzixhmxTED5JEVjxn3t/kRpGW0K:vP3dmx4D5JEzn2fy
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1900 wrote to memory of 4768 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 4768 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 4768 1900 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ac57a526aa087a6c3fbd0fafe66b27c957e9bdebeb7355b76cd932167d1b9f6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ac57a526aa087a6c3fbd0fafe66b27c957e9bdebeb7355b76cd932167d1b9f6.dll,#12⤵PID:4768
-