Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
30dd14419e13664d12b34240fc24903df617e049ae1305f476d15be48aa4fb88.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
30dd14419e13664d12b34240fc24903df617e049ae1305f476d15be48aa4fb88.dll
Resource
win10v2004-20230703-en
General
-
Target
30dd14419e13664d12b34240fc24903df617e049ae1305f476d15be48aa4fb88.dll
-
Size
534KB
-
MD5
b718de04757c2d3d78b9b5d3e331637b
-
SHA1
510f0aee71708714ceaf9636ea113e229e32320f
-
SHA256
30dd14419e13664d12b34240fc24903df617e049ae1305f476d15be48aa4fb88
-
SHA512
ae9061247ce6dd1c1a5a404f70d54777a7fad9b14047ea5b7bf7baafda991d71cd6eb7192882ddafbca399e137d4595668b263754eefb1e3d51af2098e76992c
-
SSDEEP
6144:x8iJ1iLs4dFt93jAxEWv1gmpMkkoVETpuS1dZLFE70m4uV:vms4dF+gm6fTpuS1dfC0m4g
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2604 2212 rundll32.exe 81 PID 2212 wrote to memory of 2604 2212 rundll32.exe 81 PID 2212 wrote to memory of 2604 2212 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30dd14419e13664d12b34240fc24903df617e049ae1305f476d15be48aa4fb88.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30dd14419e13664d12b34240fc24903df617e049ae1305f476d15be48aa4fb88.dll,#12⤵PID:2604
-