Analysis
-
max time kernel
60s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2023 18:57
Behavioral task
behavioral1
Sample
db20b30e943b146fc1468ad612c6c913846f2df88de35d4a6f493f0916932c1e.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
db20b30e943b146fc1468ad612c6c913846f2df88de35d4a6f493f0916932c1e.dll
Resource
win10v2004-20230621-en
General
-
Target
db20b30e943b146fc1468ad612c6c913846f2df88de35d4a6f493f0916932c1e.dll
-
Size
441KB
-
MD5
74768db2a594f04f7f132379fe494906
-
SHA1
4c62f6418265794ecfe8917a5a4b9bf85f79f72e
-
SHA256
db20b30e943b146fc1468ad612c6c913846f2df88de35d4a6f493f0916932c1e
-
SHA512
d3de0950d619e6cc125872c5a6fe49558a0a789b77ac23a2164ba03936c71870e12e7e593489e4b85d7976d4da8065112472cd475f625a576a2989cfb78469ff
-
SSDEEP
6144:34hrOuVOTJy8CVFkVMZ3ytjSa/gHc6UykF+rAaBcwoNnRsHmiTvqhADW0zGqY7qQ:2N+JyhVRZ3yYzzeoc2PoNnmvqhcUJEB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1896 wrote to memory of 3984 1896 rundll32.exe rundll32.exe PID 1896 wrote to memory of 3984 1896 rundll32.exe rundll32.exe PID 1896 wrote to memory of 3984 1896 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db20b30e943b146fc1468ad612c6c913846f2df88de35d4a6f493f0916932c1e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db20b30e943b146fc1468ad612c6c913846f2df88de35d4a6f493f0916932c1e.dll,#12⤵PID:3984