Analysis

  • max time kernel
    426s
  • max time network
    434s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    02-08-2023 23:39

General

  • Target

    Common Files/BasicSDK.dll

  • Size

    132KB

  • MD5

    434ab5ab8f4063a9f8bb77ecc5399e28

  • SHA1

    21500961d8e1d46c0c1e2a397c2a379c11f0c3da

  • SHA256

    4c4a3aad46935c4606e4512a6ab934a108904878a648e1a490ac2b6a3a0b3af2

  • SHA512

    470a6d5fdea01ed4e24b3535d9087101fb906c79f0fcecf570d268c3bc43ba7a72909e89ef8bb886f59dcb9d29e25b658ba23fd86fb5ca82b042d1d1126117fd

  • SSDEEP

    3072:MJ2dwEbhBm32dwCH8mxaklemwbeR1SqEF0:thRfsmwbSs0

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Common Files\BasicSDK.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Common Files\BasicSDK.dll",#1
      2⤵
        PID:3260

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3260-134-0x0000000000790000-0x00000000007A9000-memory.dmp

      Filesize

      100KB

    • memory/3260-135-0x0000000002030000-0x000000000205F000-memory.dmp

      Filesize

      188KB

    • memory/3260-137-0x0000000002080000-0x0000000002091000-memory.dmp

      Filesize

      68KB

    • memory/3260-136-0x0000000002060000-0x0000000002072000-memory.dmp

      Filesize

      72KB

    • memory/3260-141-0x00000000020A0000-0x00000000020BD000-memory.dmp

      Filesize

      116KB

    • memory/3260-143-0x00000000020C0000-0x00000000022D1000-memory.dmp

      Filesize

      2.1MB

    • memory/3260-145-0x00000000022E0000-0x0000000002304000-memory.dmp

      Filesize

      144KB

    • memory/3260-150-0x00000000023F0000-0x0000000002447000-memory.dmp

      Filesize

      348KB

    • memory/3260-148-0x00000000023D0000-0x00000000023EE000-memory.dmp

      Filesize

      120KB

    • memory/3260-154-0x0000000002450000-0x00000000024F7000-memory.dmp

      Filesize

      668KB

    • memory/3260-147-0x0000000002370000-0x00000000023D0000-memory.dmp

      Filesize

      384KB

    • memory/3260-142-0x0000000002310000-0x000000000234E000-memory.dmp

      Filesize

      248KB

    • memory/3260-157-0x0000000002560000-0x00000000025D0000-memory.dmp

      Filesize

      448KB

    • memory/3260-156-0x0000000002520000-0x0000000002534000-memory.dmp

      Filesize

      80KB

    • memory/3260-160-0x00000000025D0000-0x0000000002BD9000-memory.dmp

      Filesize

      6.0MB

    • memory/3260-161-0x0000000002C10000-0x0000000002C1E000-memory.dmp

      Filesize

      56KB

    • memory/3260-162-0x0000000002BE0000-0x0000000002BF3000-memory.dmp

      Filesize

      76KB

    • memory/3260-165-0x0000000002C40000-0x0000000002C54000-memory.dmp

      Filesize

      80KB

    • memory/3260-167-0x0000000002CE0000-0x0000000002D1E000-memory.dmp

      Filesize

      248KB

    • memory/3260-170-0x0000000002D80000-0x0000000003359000-memory.dmp

      Filesize

      5.8MB

    • memory/3260-169-0x0000000002D50000-0x0000000002D7C000-memory.dmp

      Filesize

      176KB

    • memory/3260-173-0x0000000002D20000-0x0000000002D2D000-memory.dmp

      Filesize

      52KB

    • memory/3260-174-0x0000000003360000-0x0000000003370000-memory.dmp

      Filesize

      64KB