Analysis
-
max time kernel
127s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
fee088d345b7fb1ac001b0ca3b448a4469edc72dd91aa110d3bf12cda1f2ed1a.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fee088d345b7fb1ac001b0ca3b448a4469edc72dd91aa110d3bf12cda1f2ed1a.dll
Resource
win10v2004-20230703-en
General
-
Target
fee088d345b7fb1ac001b0ca3b448a4469edc72dd91aa110d3bf12cda1f2ed1a.dll
-
Size
1.3MB
-
MD5
d41a8376646c0228d0708f1f1f1e4703
-
SHA1
3f7bbcf41f2730d58ca880c43ba06cbfe62a37b7
-
SHA256
fee088d345b7fb1ac001b0ca3b448a4469edc72dd91aa110d3bf12cda1f2ed1a
-
SHA512
24e51fa6c296164ea1a24f9e17a19a11d0ba9ae190524a95701a23655a4392138892a0b03da4ea158bb1b42ab4c29a3247a9ce3a6be0777ddb6ce081a24be63b
-
SSDEEP
24576:bgDwj7q6ZIn6MyE/y+GvTpe9V2JEz6sT0HM/bIeYp:Onr+e9VFzxT0HM/EeYp
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4648 wrote to memory of 500 4648 rundll32.exe 82 PID 4648 wrote to memory of 500 4648 rundll32.exe 82 PID 4648 wrote to memory of 500 4648 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fee088d345b7fb1ac001b0ca3b448a4469edc72dd91aa110d3bf12cda1f2ed1a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fee088d345b7fb1ac001b0ca3b448a4469edc72dd91aa110d3bf12cda1f2ed1a.dll,#12⤵PID:500
-