Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
59f321f3f1a6cf07b7e9a55d47c00a5c6eff13cf60402f66587a38ca24047638.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
59f321f3f1a6cf07b7e9a55d47c00a5c6eff13cf60402f66587a38ca24047638.dll
Resource
win10v2004-20230703-en
General
-
Target
59f321f3f1a6cf07b7e9a55d47c00a5c6eff13cf60402f66587a38ca24047638.dll
-
Size
1.1MB
-
MD5
f2b60ade20c9d3a61f3d9de4a094a2d8
-
SHA1
56728467d6d9cfae703651465d087e2a6e32bd0f
-
SHA256
59f321f3f1a6cf07b7e9a55d47c00a5c6eff13cf60402f66587a38ca24047638
-
SHA512
5f141adba11ea3503e441bb477ae52490e9dddeda469d9158041e8fda7034808296149fcb238d9ea675b19acdd80b99cabd8b90f743b3f2155f1c58875c1dfed
-
SSDEEP
12288:mPa2PvHNMV+VNVLV9Ve1trucTpL9rjg08+ufIZSmzxx/M2O+ueO+ueP/vfP/vfPo:01a1tLyRffMx/Wf/r
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4792 wrote to memory of 1316 4792 rundll32.exe 81 PID 4792 wrote to memory of 1316 4792 rundll32.exe 81 PID 4792 wrote to memory of 1316 4792 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\59f321f3f1a6cf07b7e9a55d47c00a5c6eff13cf60402f66587a38ca24047638.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\59f321f3f1a6cf07b7e9a55d47c00a5c6eff13cf60402f66587a38ca24047638.dll,#12⤵PID:1316
-