Analysis
-
max time kernel
186s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
02-10-2023 04:47
Static task
static1
Behavioral task
behavioral1
Sample
015b0970e9f843e95848ada1584793d0e2f26f64ba0920e4a683a2ddf9ec9dd8.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
015b0970e9f843e95848ada1584793d0e2f26f64ba0920e4a683a2ddf9ec9dd8.dll
Resource
win10-20230915-en
General
-
Target
015b0970e9f843e95848ada1584793d0e2f26f64ba0920e4a683a2ddf9ec9dd8.dll
-
Size
2.5MB
-
MD5
58712b97da2746fa9b31c05c18cf283d
-
SHA1
c0aa5faf615cdf60732496c33090d3ff14a10648
-
SHA256
015b0970e9f843e95848ada1584793d0e2f26f64ba0920e4a683a2ddf9ec9dd8
-
SHA512
740ca46691bc6f28f6b49a92cd7e601d0a19905d589bf4256d289a05b6a98e1ea8632f88c02d12ea2dada44cde89791b6f3411d188b98ed78dd3eb3518a11ccd
-
SSDEEP
49152:DmuwoMVV8XztkPYgfYC0OiEEgMZ92eXoqtH7e0E+X8Ler:auwo0YkPjfN0QEgOPX5Vr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3864 wrote to memory of 4940 3864 rundll32.exe 69 PID 3864 wrote to memory of 4940 3864 rundll32.exe 69 PID 3864 wrote to memory of 4940 3864 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\015b0970e9f843e95848ada1584793d0e2f26f64ba0920e4a683a2ddf9ec9dd8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\015b0970e9f843e95848ada1584793d0e2f26f64ba0920e4a683a2ddf9ec9dd8.dll,#12⤵PID:4940
-