Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2023 09:42
Static task
static1
Behavioral task
behavioral1
Sample
15a035690f46ac1ba09635cf723baa7218146c8fdb07306395449bdbc8c9b518.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
15a035690f46ac1ba09635cf723baa7218146c8fdb07306395449bdbc8c9b518.dll
Resource
win10v2004-20230915-en
General
-
Target
15a035690f46ac1ba09635cf723baa7218146c8fdb07306395449bdbc8c9b518.dll
-
Size
152KB
-
MD5
88180a852e0573d446055b54632ac631
-
SHA1
7b6f3a4d68f0f30710d8b5177a8bf5fafd3b4cc4
-
SHA256
15a035690f46ac1ba09635cf723baa7218146c8fdb07306395449bdbc8c9b518
-
SHA512
f46ab46e6eca6be1dfe3ceb9c167f8cd23f03cf3309f8840450c1c323bb16ff531059534d66878e0f6c78fbd567064e820f8dd2d1a493f4a459feb17193f123b
-
SSDEEP
3072:2y4iI52Dgz/c6CtlrgbRMQHYBsSuvHgOxAmk7GXDN5ewsdQNgFTHDy/xgA:2y4iIEYdCCMQ4OSuvHtAmk7YSpTjyv
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4288 rundll32.exe 4288 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4672 wrote to memory of 4288 4672 rundll32.exe 85 PID 4672 wrote to memory of 4288 4672 rundll32.exe 85 PID 4672 wrote to memory of 4288 4672 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15a035690f46ac1ba09635cf723baa7218146c8fdb07306395449bdbc8c9b518.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15a035690f46ac1ba09635cf723baa7218146c8fdb07306395449bdbc8c9b518.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-