Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/10/2023, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
d8f5a2a4c6648ada219fe13455adbff1bb1da6630b4de9de0db8130a4f20ae86.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d8f5a2a4c6648ada219fe13455adbff1bb1da6630b4de9de0db8130a4f20ae86.dll
Resource
win10v2004-20230915-en
General
-
Target
d8f5a2a4c6648ada219fe13455adbff1bb1da6630b4de9de0db8130a4f20ae86.dll
-
Size
192KB
-
MD5
03bba3e42d00cc109c1280fa23ce2279
-
SHA1
a310b99422162c0c7582ea7ed2feb070a2073f3b
-
SHA256
d8f5a2a4c6648ada219fe13455adbff1bb1da6630b4de9de0db8130a4f20ae86
-
SHA512
8b8c05eec1056af3b7c891a7e56eb3352d07effaa00dd8c9f0af420f5edcefcbbb8021f46f1229c4ab07ea2f8b4f4f1ae79cdb05d1215d05351dcd4ceb49229c
-
SSDEEP
3072:oxk5qKqlva4wjnUfvfIDoXsufnCQl1Yz6pORmRDgtzfCf1:oxk5qFv0nUfsGs5qO+xRcW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1720 2224 rundll32.exe 28 PID 2224 wrote to memory of 1720 2224 rundll32.exe 28 PID 2224 wrote to memory of 1720 2224 rundll32.exe 28 PID 2224 wrote to memory of 1720 2224 rundll32.exe 28 PID 2224 wrote to memory of 1720 2224 rundll32.exe 28 PID 2224 wrote to memory of 1720 2224 rundll32.exe 28 PID 2224 wrote to memory of 1720 2224 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8f5a2a4c6648ada219fe13455adbff1bb1da6630b4de9de0db8130a4f20ae86.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8f5a2a4c6648ada219fe13455adbff1bb1da6630b4de9de0db8130a4f20ae86.dll,#12⤵PID:1720
-