Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
429d91778c3a5dfe2d0a3c2ba3a15cf9fb4dd9e141451c99d49e7a5b535fadda.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
429d91778c3a5dfe2d0a3c2ba3a15cf9fb4dd9e141451c99d49e7a5b535fadda.dll
Resource
win10v2004-20230703-en
General
-
Target
429d91778c3a5dfe2d0a3c2ba3a15cf9fb4dd9e141451c99d49e7a5b535fadda.dll
-
Size
214KB
-
MD5
002cd39a8e49d8480a91fcc8b8ec141c
-
SHA1
e4acf19c9640ae7f113f341db7d1eddab008836e
-
SHA256
429d91778c3a5dfe2d0a3c2ba3a15cf9fb4dd9e141451c99d49e7a5b535fadda
-
SHA512
9f54447656606aa32887b7e814916e45631afd576219c32dc576247c2cc23e12d0eaa4e62986cc3e2b656c94604fab972f20659df13bef4a9eeb8ecec109d663
-
SSDEEP
3072:Lpc4pcbPKKX2MWjmR55SH3DKJoJgndjaJaeoUUZv/usS+rQWM9ZJTIvRWLzTa72k:WbGBgndAo1jS+rQWMmRMn/K4W
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4120 wrote to memory of 4748 4120 rundll32.exe 80 PID 4120 wrote to memory of 4748 4120 rundll32.exe 80 PID 4120 wrote to memory of 4748 4120 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\429d91778c3a5dfe2d0a3c2ba3a15cf9fb4dd9e141451c99d49e7a5b535fadda.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\429d91778c3a5dfe2d0a3c2ba3a15cf9fb4dd9e141451c99d49e7a5b535fadda.dll,#12⤵PID:4748
-