Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2023 17:58
Static task
static1
Behavioral task
behavioral1
Sample
60b133e82a124666d6064bfdd8b32ff4374adb65f1a4b3dd4350991106b97eb3.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
60b133e82a124666d6064bfdd8b32ff4374adb65f1a4b3dd4350991106b97eb3.dll
Resource
win10v2004-20230703-en
General
-
Target
60b133e82a124666d6064bfdd8b32ff4374adb65f1a4b3dd4350991106b97eb3.dll
-
Size
128KB
-
MD5
5b9895f7ba51f73fb7cc75dd4761f4ca
-
SHA1
012c405d30c9a679c7606a7b7fca0db110dbe36b
-
SHA256
60b133e82a124666d6064bfdd8b32ff4374adb65f1a4b3dd4350991106b97eb3
-
SHA512
32c6fa56b4e8a03f766cfb075b3730281587ff4ec2c4e66e30766c90feb49c0102475c7dfb4b80cbff7227ed9fb1e276ab47e4b70979fa73addf5f30d2df9f4c
-
SSDEEP
1536:4GWyWc/YViyS2uNoG7zPQ4uaqIuXbSVdJssWdcdmh+WyJbKz1YsDN1ii+ueU:4GXgiyS207zAwJJmcWyJbW1YsDr+ueU
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 2328 5052 rundll32.exe 82 PID 5052 wrote to memory of 2328 5052 rundll32.exe 82 PID 5052 wrote to memory of 2328 5052 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60b133e82a124666d6064bfdd8b32ff4374adb65f1a4b3dd4350991106b97eb3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60b133e82a124666d6064bfdd8b32ff4374adb65f1a4b3dd4350991106b97eb3.dll,#12⤵PID:2328
-