Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2023 15:38
Static task
static1
Behavioral task
behavioral1
Sample
7bcb5698049af1c9247e9ec036f60072e623a762213a441935000d10eecdadc3.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7bcb5698049af1c9247e9ec036f60072e623a762213a441935000d10eecdadc3.dll
Resource
win10v2004-20230703-en
General
-
Target
7bcb5698049af1c9247e9ec036f60072e623a762213a441935000d10eecdadc3.dll
-
Size
4.1MB
-
MD5
bc37221f0b2b2de988dea99e7a7ffdc0
-
SHA1
29397e45a6e303fc027dcfb4276be9081389face
-
SHA256
7bcb5698049af1c9247e9ec036f60072e623a762213a441935000d10eecdadc3
-
SHA512
4b9597ad60d74a433e7c1d625de5efda909bf6a2654e54e3670c8df5d5ad059634a848d9dff3b0b157c052c09000b8087426aa4a08362292290e00708d80872c
-
SSDEEP
49152:hoyNcBA7YMDZm7lUyd2iNKnlV9vLk/IJbkLmLraMDJwa47N+9YVRNduBeA1PO9XS:eEpdwVLQ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3712 2420 rundll32.exe 82 PID 2420 wrote to memory of 3712 2420 rundll32.exe 82 PID 2420 wrote to memory of 3712 2420 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7bcb5698049af1c9247e9ec036f60072e623a762213a441935000d10eecdadc3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7bcb5698049af1c9247e9ec036f60072e623a762213a441935000d10eecdadc3.dll,#12⤵PID:3712
-