Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2023 08:03
Static task
static1
Behavioral task
behavioral1
Sample
39899b9487230b3303d8025784439c4c8cbb974dbc95e6ca242f2ce8cb13ab97.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
39899b9487230b3303d8025784439c4c8cbb974dbc95e6ca242f2ce8cb13ab97.dll
Resource
win10v2004-20230703-en
General
-
Target
39899b9487230b3303d8025784439c4c8cbb974dbc95e6ca242f2ce8cb13ab97.dll
-
Size
55KB
-
MD5
8c688fc94281b9294df51f019df190fe
-
SHA1
1f153514dbb754d887ccd643bfaabeb782ce4787
-
SHA256
39899b9487230b3303d8025784439c4c8cbb974dbc95e6ca242f2ce8cb13ab97
-
SHA512
b434cbc6758878798f21332ed7720479969bc23965e1e7b0e69bc003cd9d35fba08c048fc76ac25d9db16cd1ce90b9a787d909cfdd344f102f7e19ba44f46216
-
SSDEEP
768:AisoPtX5gmW4GcRJBpGHgjLGXipGdB4SDMwT+qC2:eoPtNW4VRJBpGHgjeipGdB4Sj6qC2
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3772 wrote to memory of 4308 3772 rundll32.exe 62 PID 3772 wrote to memory of 4308 3772 rundll32.exe 62 PID 3772 wrote to memory of 4308 3772 rundll32.exe 62
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39899b9487230b3303d8025784439c4c8cbb974dbc95e6ca242f2ce8cb13ab97.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39899b9487230b3303d8025784439c4c8cbb974dbc95e6ca242f2ce8cb13ab97.dll,#12⤵PID:4308
-