Analysis
-
max time kernel
78s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2023 20:54
Static task
static1
Behavioral task
behavioral1
Sample
0afd684c567b05f8a9ca68635e2712b94e95dc9c31c5eedd108bbfe848b1a7bc.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
0afd684c567b05f8a9ca68635e2712b94e95dc9c31c5eedd108bbfe848b1a7bc.dll
Resource
win10v2004-20230621-en
General
-
Target
0afd684c567b05f8a9ca68635e2712b94e95dc9c31c5eedd108bbfe848b1a7bc.dll
-
Size
324KB
-
MD5
446b861f2727ea0c737ade6d63d745d9
-
SHA1
9d2e3e025aa39876a980bb4179abc1aec304fb67
-
SHA256
0afd684c567b05f8a9ca68635e2712b94e95dc9c31c5eedd108bbfe848b1a7bc
-
SHA512
6f21c6f217ba6fb699ee6e4fe6dc8899061070cbf3f447a7a06f397c55a90726539acc74538253139d149638094dcf4102a777fd057700abdd4b52d6f01c8c1f
-
SSDEEP
6144:4TsKckSdyKosBjO9K752IEA0XbwMtO5Bv34oU:tKTGbjBjO9S535engL34o
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 448 wrote to memory of 4848 448 rundll32.exe 83 PID 448 wrote to memory of 4848 448 rundll32.exe 83 PID 448 wrote to memory of 4848 448 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0afd684c567b05f8a9ca68635e2712b94e95dc9c31c5eedd108bbfe848b1a7bc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0afd684c567b05f8a9ca68635e2712b94e95dc9c31c5eedd108bbfe848b1a7bc.dll,#12⤵PID:4848
-