Analysis
-
max time kernel
129s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
01/08/2023, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
53b026bb018b78336448bba5b011aab447144208709ca0f765fc702c3c65bafa.dll
Resource
win10-20230703-en
1 signatures
150 seconds
General
-
Target
53b026bb018b78336448bba5b011aab447144208709ca0f765fc702c3c65bafa.dll
-
Size
29KB
-
MD5
ef0184fd418630983422ac8185d1ce87
-
SHA1
42589cccbe76c61a3d32f57f4e50ddcd9af1a7fe
-
SHA256
53b026bb018b78336448bba5b011aab447144208709ca0f765fc702c3c65bafa
-
SHA512
e6a6fbeba0fbb39e39b6a648d1f376173cc45c26aff4c8335260ac64b25c07b200fe2eba15f6c05939dc1d5d4ffea06cfe6895f27badbdb01a88502f8fc6480d
-
SSDEEP
768:5oVKVxPXWWmgIx7cKOEZFmCTia/Ym/ltu6LRiTZKj:5oVKDWHy4ZFmRlm/7uOOKj
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 652 wrote to memory of 2764 652 rundll32.exe 70 PID 652 wrote to memory of 2764 652 rundll32.exe 70 PID 652 wrote to memory of 2764 652 rundll32.exe 70
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53b026bb018b78336448bba5b011aab447144208709ca0f765fc702c3c65bafa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53b026bb018b78336448bba5b011aab447144208709ca0f765fc702c3c65bafa.dll,#12⤵PID:2764
-