Analysis
-
max time kernel
123s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2023 20:56
Static task
static1
Behavioral task
behavioral1
Sample
0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687.dll
Resource
win10v2004-20230703-en
General
-
Target
0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687.dll
-
Size
1.8MB
-
MD5
89ef3a3aa8a98ae5b31316ee8c49ba9c
-
SHA1
86b0ecc269e870dd5d575d6e7734e6880c9e1df9
-
SHA256
0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687
-
SHA512
8812951fb0db683b2c346364ef9ee201bb9db3720fc759782d462fbf7dce6e2bee267adffb06ee9a584db459d32865968e9d76a6993457be4c04305137fbbf50
-
SSDEEP
49152:bA7B6tn1g+OEjECcLwv3OzK37gkAXQMb4K/jhPuJcRkons01Bl/:w6tn1/OEjRo2O23MkAXh3/jhPuJcRkon
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2660 wrote to memory of 3424 2660 rundll32.exe 82 PID 2660 wrote to memory of 3424 2660 rundll32.exe 82 PID 2660 wrote to memory of 3424 2660 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b43585dee68bb9af48f1d5c959fabd4a22ca8c3feb8fc47f80f88ea1d0e2687.dll,#12⤵PID:3424
-