Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2023, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
198758da01a834b95ee6ee0b1e43ea194656c35669a10ef794fd696509a56591.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
198758da01a834b95ee6ee0b1e43ea194656c35669a10ef794fd696509a56591.dll
Resource
win10v2004-20230915-en
General
-
Target
198758da01a834b95ee6ee0b1e43ea194656c35669a10ef794fd696509a56591.dll
-
Size
1.7MB
-
MD5
5e0fc553e0b48e977647a870830d0cd3
-
SHA1
e41ff23739ecf4265a910cf41bebefee4d32d013
-
SHA256
198758da01a834b95ee6ee0b1e43ea194656c35669a10ef794fd696509a56591
-
SHA512
82ee95806f4b05e0746461aa5553066d7b2535c31fa5b770aca5a63094b9cedf61bffbe9640080d7ad645dd953ec1f880755bd0d0508b75201c0ad4f0d9e8efd
-
SSDEEP
12288:GzDaoWFBmFxKZbbqbpMmr8xRSLI9jXx/YWdNpCFYDq0siPnJjWX+L1aNT:GzGhxZb+VDrGOIdx/YADjsk0k1aNT
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 224 wrote to memory of 1372 224 rundll32.exe 85 PID 224 wrote to memory of 1372 224 rundll32.exe 85 PID 224 wrote to memory of 1372 224 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\198758da01a834b95ee6ee0b1e43ea194656c35669a10ef794fd696509a56591.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\198758da01a834b95ee6ee0b1e43ea194656c35669a10ef794fd696509a56591.dll,#12⤵PID:1372
-