Analysis
-
max time kernel
70s -
max time network
185s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
04-10-2023 03:41
Static task
static1
Behavioral task
behavioral1
Sample
5dcd07ab93faa79e2e6aad53e9c8440cf740f5de390e0cc3780541520387150b.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5dcd07ab93faa79e2e6aad53e9c8440cf740f5de390e0cc3780541520387150b.dll
Resource
win10-20230915-en
General
-
Target
5dcd07ab93faa79e2e6aad53e9c8440cf740f5de390e0cc3780541520387150b.dll
-
Size
2.3MB
-
MD5
0101afeef08d7c91bf8568c02c712ea3
-
SHA1
b9dcbd31640c520e8672a454496d4a6ec212f7b3
-
SHA256
5dcd07ab93faa79e2e6aad53e9c8440cf740f5de390e0cc3780541520387150b
-
SHA512
4d3005b967240214e7acc5ee4c796edde3c71d3e5586752da91b7cdc1ae5e544e26e6f4e508d1d98a1f4ab3ad94e1b8057e4bb388890b093bc5b49a968125271
-
SSDEEP
49152:mg8kQtIB3vYaUDWNzd1ReHmTWXXRFvyL889d/2/VXXaYSW:m3aB/sDq1R8VDvN89xmH7SW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1168 wrote to memory of 3444 1168 rundll32.exe 70 PID 1168 wrote to memory of 3444 1168 rundll32.exe 70 PID 1168 wrote to memory of 3444 1168 rundll32.exe 70
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5dcd07ab93faa79e2e6aad53e9c8440cf740f5de390e0cc3780541520387150b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5dcd07ab93faa79e2e6aad53e9c8440cf740f5de390e0cc3780541520387150b.dll,#12⤵PID:3444
-