Analysis
-
max time kernel
136s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2023 02:50
Static task
static1
Behavioral task
behavioral1
Sample
4e7d6ca623e015da654e5355afcee074e072d885efbb6a434786d54a5b2fe889.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4e7d6ca623e015da654e5355afcee074e072d885efbb6a434786d54a5b2fe889.dll
Resource
win10v2004-20230915-en
General
-
Target
4e7d6ca623e015da654e5355afcee074e072d885efbb6a434786d54a5b2fe889.dll
-
Size
3.3MB
-
MD5
24d8df1c0873dbdf39c2f216d939a865
-
SHA1
83f2ad097fac58e47fa2abdbbd207a3236526997
-
SHA256
4e7d6ca623e015da654e5355afcee074e072d885efbb6a434786d54a5b2fe889
-
SHA512
8dc83754064606eb70ddaa093ca9f85b4f290fd7ac0c324f3991fd12ff63a29bbb8972c0579d3b639dd8cfd6bed2d8d98f47421f6bacdaf5600d4937d8d5c306
-
SSDEEP
98304:wi+Bp0bTP47UX6L5FyVPFvW3tQgOqQPKSI+oj9ghi1RebMIg9Cbk/V8aO+R80UmL:opl7R5lugOqQPtojDIg9Cbk/V8+
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4724 4016 rundll32.exe 84 PID 4016 wrote to memory of 4724 4016 rundll32.exe 84 PID 4016 wrote to memory of 4724 4016 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4e7d6ca623e015da654e5355afcee074e072d885efbb6a434786d54a5b2fe889.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4e7d6ca623e015da654e5355afcee074e072d885efbb6a434786d54a5b2fe889.dll,#12⤵PID:4724
-