Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2023, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
9c8387b6e51be23f0f1c2cfedee44b93b75d852918fd5e3ae0c63a744f2cd398.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9c8387b6e51be23f0f1c2cfedee44b93b75d852918fd5e3ae0c63a744f2cd398.dll
Resource
win10v2004-20230703-en
General
-
Target
9c8387b6e51be23f0f1c2cfedee44b93b75d852918fd5e3ae0c63a744f2cd398.dll
-
Size
198KB
-
MD5
e03e0ad2ff468fa1e60208c02b0fdcbe
-
SHA1
9b016abeff78a525edecb3e9af6c538eb1e62f82
-
SHA256
9c8387b6e51be23f0f1c2cfedee44b93b75d852918fd5e3ae0c63a744f2cd398
-
SHA512
0d0812a403b2cbd8aa88691c3f386dbd5aeb7a1cb43db59931cbb1a3580f7d437fad785e09cd7a4067a287ecbf0580fd4ca95ec4e64dacebc75ec911d1683fee
-
SSDEEP
3072:S1l3qN5xLIjfkQmwngYJG5HcKviUa41IUrQZ5sPA79OMQaWy/:Sn3qN50kQfJG5HcKpIWQZ5sPAOMQa
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4708 wrote to memory of 3296 4708 rundll32.exe 82 PID 4708 wrote to memory of 3296 4708 rundll32.exe 82 PID 4708 wrote to memory of 3296 4708 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c8387b6e51be23f0f1c2cfedee44b93b75d852918fd5e3ae0c63a744f2cd398.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c8387b6e51be23f0f1c2cfedee44b93b75d852918fd5e3ae0c63a744f2cd398.dll,#12⤵PID:3296
-