Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
0764408bc422786a13040d885050a7cbf6c99cbb004cdc74119bbaa40b34e864.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0764408bc422786a13040d885050a7cbf6c99cbb004cdc74119bbaa40b34e864.dll
Resource
win10v2004-20230703-en
General
-
Target
0764408bc422786a13040d885050a7cbf6c99cbb004cdc74119bbaa40b34e864.dll
-
Size
100KB
-
MD5
e9f629fba437508d46d98562a5627168
-
SHA1
56e5c62b79f6114752b68fbc57d3ab08bf433280
-
SHA256
0764408bc422786a13040d885050a7cbf6c99cbb004cdc74119bbaa40b34e864
-
SHA512
b0143bc04758f3218d426e8770a4070119464674e4c21a4fdf70d33c09dc8488a0b8c873cd3fc0d3eb1c2a415e8b1ec61601f75b14ba9767775b4c8e476d7d3d
-
SSDEEP
1536:fglyIto47i1nGtwfSkjmh9vo/ZVMWn+aXcmY9+/QMsWjcdlnyVMi7FC:342ngUSkj5RKWn+aRelnyVMi7FC
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4204 wrote to memory of 972 4204 rundll32.exe 80 PID 4204 wrote to memory of 972 4204 rundll32.exe 80 PID 4204 wrote to memory of 972 4204 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0764408bc422786a13040d885050a7cbf6c99cbb004cdc74119bbaa40b34e864.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0764408bc422786a13040d885050a7cbf6c99cbb004cdc74119bbaa40b34e864.dll,#12⤵PID:972
-