Analysis
-
max time kernel
131s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
6e3e2d1ca77d078782c5028b7929607bdbccd6b3328b5709b45e658f0954502d.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6e3e2d1ca77d078782c5028b7929607bdbccd6b3328b5709b45e658f0954502d.dll
Resource
win10v2004-20230703-en
General
-
Target
6e3e2d1ca77d078782c5028b7929607bdbccd6b3328b5709b45e658f0954502d.dll
-
Size
33KB
-
MD5
1b8fa06762b251caf7893d5da606be5c
-
SHA1
e64ee8e616a6ffaf82e764ea34e8c3abb55ad82f
-
SHA256
6e3e2d1ca77d078782c5028b7929607bdbccd6b3328b5709b45e658f0954502d
-
SHA512
a2765a3241dbe0fdafc5c44cbe99fcdeffddac28e649232bfe55fa658cd90b68e4369188217c3f26a730c860d0a518264ec7e20bf26e487d6f07b4581fbd16ca
-
SSDEEP
768:nU42jMCjAbhpcBxJC9/fOA28+uJ9fNErzf+0IGIPX5WQSx:U42jMCjAbhCBEOA28hWrzf+0IGIPX5WV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4844 wrote to memory of 4424 4844 rundll32.exe 83 PID 4844 wrote to memory of 4424 4844 rundll32.exe 83 PID 4844 wrote to memory of 4424 4844 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e3e2d1ca77d078782c5028b7929607bdbccd6b3328b5709b45e658f0954502d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e3e2d1ca77d078782c5028b7929607bdbccd6b3328b5709b45e658f0954502d.dll,#12⤵PID:4424
-