Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2023 04:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d7e1b8b1ed43d529f78fd0673391dad9c2ce65de7b0f04e1b6c599050ecd9353.dll
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d7e1b8b1ed43d529f78fd0673391dad9c2ce65de7b0f04e1b6c599050ecd9353.dll
Resource
win10v2004-20230915-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
d7e1b8b1ed43d529f78fd0673391dad9c2ce65de7b0f04e1b6c599050ecd9353.dll
-
Size
26KB
-
MD5
d37643078fd004e74e0996473fd9279c
-
SHA1
c7694ae8e90ebbfb81e09c84163d0a940abac20b
-
SHA256
d7e1b8b1ed43d529f78fd0673391dad9c2ce65de7b0f04e1b6c599050ecd9353
-
SHA512
be55831436560a397e0201dc4626652b674a1f20d4d71a11b1e5f8d8ae5a09fc22a1c4a10d8a7fc8f01357446deb9747eeddbd8bce525bdf286a20cd15a5f378
-
SSDEEP
768:TLkSuk9YOcyjrh8swc/I0Sdx06t6DDBK:vhYOcyHh8x02xZaDB
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2528 1616 rundll32.exe 21 PID 1616 wrote to memory of 2528 1616 rundll32.exe 21 PID 1616 wrote to memory of 2528 1616 rundll32.exe 21
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7e1b8b1ed43d529f78fd0673391dad9c2ce65de7b0f04e1b6c599050ecd9353.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7e1b8b1ed43d529f78fd0673391dad9c2ce65de7b0f04e1b6c599050ecd9353.dll,#12⤵PID:2528
-