Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
1e79152242310a8b0d60d1a444557e00d1384634eb2bc3c99fe2260996327ae4.dll
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
1e79152242310a8b0d60d1a444557e00d1384634eb2bc3c99fe2260996327ae4.dll
Resource
win10v2004-20230703-en
General
-
Target
1e79152242310a8b0d60d1a444557e00d1384634eb2bc3c99fe2260996327ae4.dll
-
Size
2.0MB
-
MD5
96617d54ec90fa70a9b8abec9347b8a3
-
SHA1
996863a133dcf0e776b7cbe4215b8f6a29d1461c
-
SHA256
1e79152242310a8b0d60d1a444557e00d1384634eb2bc3c99fe2260996327ae4
-
SHA512
c42c9c9b9c91fd1dc3e801c25a7c448a28012ec90a86999b184a0c4522346ab38e66d1a4e8942bf890897e66b6827b38f8c83712bbebf806753d9f523e9c8098
-
SSDEEP
24576:YSdgnW4B3ICkLK9QZt0LKd939n7/f78qtMhbV+CosmKF5mbNG9c7XcWTW29ROev+:Dgb3Ie9QZt0M5VjuAKFdcrrF9ROevzh0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 2468 4920 rundll32.exe 82 PID 4920 wrote to memory of 2468 4920 rundll32.exe 82 PID 4920 wrote to memory of 2468 4920 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1e79152242310a8b0d60d1a444557e00d1384634eb2bc3c99fe2260996327ae4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1e79152242310a8b0d60d1a444557e00d1384634eb2bc3c99fe2260996327ae4.dll,#12⤵PID:2468
-