Analysis
-
max time kernel
126s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
cd20b3d9047ce4d00a2111b5c8a27938076fbf9f788d492535d9b6d1e25ce3df.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cd20b3d9047ce4d00a2111b5c8a27938076fbf9f788d492535d9b6d1e25ce3df.dll
Resource
win10v2004-20230831-en
General
-
Target
cd20b3d9047ce4d00a2111b5c8a27938076fbf9f788d492535d9b6d1e25ce3df.dll
-
Size
221KB
-
MD5
7d36553996b8327c451211636563ab15
-
SHA1
7f0a5f80e6aec72602272a2b78f31cc16ced3f4f
-
SHA256
cd20b3d9047ce4d00a2111b5c8a27938076fbf9f788d492535d9b6d1e25ce3df
-
SHA512
d23aafc4736e27e9e25285309154a2d4728c6e7b4938b2ef7d7f93037854387bd97aab66a5079d42d67efd2738950f229a1c6261ddc0d1c77771c05fb65eeea9
-
SSDEEP
6144:3TZzqf+2ZbLZUvuDr2rvDM+YvP7gj5NeJEPURc1:3M+2Pyu3avDMUvmu1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1748 wrote to memory of 4580 1748 rundll32.exe 81 PID 1748 wrote to memory of 4580 1748 rundll32.exe 81 PID 1748 wrote to memory of 4580 1748 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd20b3d9047ce4d00a2111b5c8a27938076fbf9f788d492535d9b6d1e25ce3df.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd20b3d9047ce4d00a2111b5c8a27938076fbf9f788d492535d9b6d1e25ce3df.dll,#12⤵PID:4580
-