Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/08/2023, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687.dll
Resource
win10v2004-20230703-en
General
-
Target
0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687.dll
-
Size
1.8MB
-
MD5
89ef3a3aa8a98ae5b31316ee8c49ba9c
-
SHA1
86b0ecc269e870dd5d575d6e7734e6880c9e1df9
-
SHA256
0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687
-
SHA512
8812951fb0db683b2c346364ef9ee201bb9db3720fc759782d462fbf7dce6e2bee267adffb06ee9a584db459d32865968e9d76a6993457be4c04305137fbbf50
-
SSDEEP
49152:bA7B6tn1g+OEjECcLwv3OzK37gkAXQMb4K/jhPuJcRkons01Bl/:w6tn1/OEjRo2O23MkAXh3/jhPuJcRkon
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 268 wrote to memory of 1444 268 rundll32.exe 28 PID 268 wrote to memory of 1444 268 rundll32.exe 28 PID 268 wrote to memory of 1444 268 rundll32.exe 28 PID 268 wrote to memory of 1444 268 rundll32.exe 28 PID 268 wrote to memory of 1444 268 rundll32.exe 28 PID 268 wrote to memory of 1444 268 rundll32.exe 28 PID 268 wrote to memory of 1444 268 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687.dll,#12⤵PID:1444
-