Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
30-09-2023 12:46
Static task
static1
Behavioral task
behavioral1
Sample
0a220adfff2877a3ab5d326fbb8c7ef3c29477c9465c3aa8f7a400b8db68c218.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0a220adfff2877a3ab5d326fbb8c7ef3c29477c9465c3aa8f7a400b8db68c218.dll
Resource
win10v2004-20230915-en
General
-
Target
0a220adfff2877a3ab5d326fbb8c7ef3c29477c9465c3aa8f7a400b8db68c218.dll
-
Size
2.1MB
-
MD5
270e195280ca5d78a43c4a1abe7e01e4
-
SHA1
f305048a71e3042bfab9cdb644c6e5412307a2d9
-
SHA256
0a220adfff2877a3ab5d326fbb8c7ef3c29477c9465c3aa8f7a400b8db68c218
-
SHA512
30d782ef8d3cec2ac3e72581db0dc985ce74b41db1fc6f5ff7656e0a863e2b36695a482459fb7900f35a2c8f3e98e12d8300ff9630f1924a1b2a2163869e5b01
-
SSDEEP
49152:y8feI79oK2LUrHv31PJbhJ/P0BDpinATs75a78tN:y8D7WK2W/teBDpgh08tN
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2068 2260 rundll32.exe 28 PID 2260 wrote to memory of 2068 2260 rundll32.exe 28 PID 2260 wrote to memory of 2068 2260 rundll32.exe 28 PID 2260 wrote to memory of 2068 2260 rundll32.exe 28 PID 2260 wrote to memory of 2068 2260 rundll32.exe 28 PID 2260 wrote to memory of 2068 2260 rundll32.exe 28 PID 2260 wrote to memory of 2068 2260 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a220adfff2877a3ab5d326fbb8c7ef3c29477c9465c3aa8f7a400b8db68c218.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a220adfff2877a3ab5d326fbb8c7ef3c29477c9465c3aa8f7a400b8db68c218.dll,#12⤵PID:2068
-