Analysis
-
max time kernel
127s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2023 09:40
Static task
static1
Behavioral task
behavioral1
Sample
4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd.dll
Resource
win10v2004-20230703-en
General
-
Target
4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd.dll
-
Size
263KB
-
MD5
81dba9c0e3ccd62cb4eb227a3e2f12b0
-
SHA1
546ec8366f335a62a38c1212c3658a880bc48378
-
SHA256
4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd
-
SHA512
77c12b24f4183ffbef2f3096efa6adf7aadf775584a33d90c3edfed1bd572d27149a508ab6f6c4c04434c1c638e895b5c897745d9ec4161c0ed8ed3ab259be47
-
SSDEEP
3072:SuNR0oDe/sy8cN+x/cBW2j+avTpFsNWTylkWaSbi2196Y/mEYZJC5ZlX5ute3MCV:SiR4sHSvDs4TyG7Mv+Y/IZJC7ov
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4776 wrote to memory of 4968 4776 rundll32.exe 82 PID 4776 wrote to memory of 4968 4776 rundll32.exe 82 PID 4776 wrote to memory of 4968 4776 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d374cb9fd153a90f9ca5bc50e4683c8277109d584b9adf4c1bb690f3a62f6cd.dll,#12⤵PID:4968
-