Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2023 09:13
Static task
static1
Behavioral task
behavioral1
Sample
26dce13cd94c3c11631b479609c4610591b35ac628f844ab16221df775b4da2d.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
26dce13cd94c3c11631b479609c4610591b35ac628f844ab16221df775b4da2d.dll
Resource
win10v2004-20230703-en
General
-
Target
26dce13cd94c3c11631b479609c4610591b35ac628f844ab16221df775b4da2d.dll
-
Size
1.3MB
-
MD5
c7e8cf716b54f32c32be219fc43b8c5d
-
SHA1
ef0e8f3b14c1bdd8e9cf7055a93803627bc940ab
-
SHA256
26dce13cd94c3c11631b479609c4610591b35ac628f844ab16221df775b4da2d
-
SHA512
77b8f5348855bd692ab1f663e65cfd4dc6f74517e0468dd93df50dbb5f47823426717779c49e136fa26d5d1149ba17e9cb939180d869cf2559abea6e6e59890f
-
SSDEEP
24576:JAbSjZ4h7POKX1UshOrD5CWQ70BN8uum94+BHL3P/VP:JAbSqh7mdsI3ozug+ZDP/VP
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4692 wrote to memory of 2688 4692 rundll32.exe 84 PID 4692 wrote to memory of 2688 4692 rundll32.exe 84 PID 4692 wrote to memory of 2688 4692 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\26dce13cd94c3c11631b479609c4610591b35ac628f844ab16221df775b4da2d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\26dce13cd94c3c11631b479609c4610591b35ac628f844ab16221df775b4da2d.dll,#12⤵PID:2688
-