Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
0f7d74e29b265bacfc98f9ba7ce80b46b084175b44bc935e81d2c15bbf9061b1.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0f7d74e29b265bacfc98f9ba7ce80b46b084175b44bc935e81d2c15bbf9061b1.dll
Resource
win10v2004-20230915-en
General
-
Target
0f7d74e29b265bacfc98f9ba7ce80b46b084175b44bc935e81d2c15bbf9061b1.dll
-
Size
463KB
-
MD5
ff6748b6a0fdb1ab33c4b46a4c823906
-
SHA1
4d431168959bee68a48818ff641e9e68e47bd1d6
-
SHA256
0f7d74e29b265bacfc98f9ba7ce80b46b084175b44bc935e81d2c15bbf9061b1
-
SHA512
11182b9fb339c86230ee72b33b9f77bbc42ce2acc3e50b73b7a456b52abe624a4837f1e7881a6f2d04b88e488fdb58654751ee6f958af11bc113e4ea68fc2832
-
SSDEEP
12288:xmKGGZha4MBzZSPOUvWlZM1qTk5yEu2JMzSOBkM1c2:xmW84WdSMYqYO2uP2
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1744 wrote to memory of 3180 1744 rundll32.exe 85 PID 1744 wrote to memory of 3180 1744 rundll32.exe 85 PID 1744 wrote to memory of 3180 1744 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f7d74e29b265bacfc98f9ba7ce80b46b084175b44bc935e81d2c15bbf9061b1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f7d74e29b265bacfc98f9ba7ce80b46b084175b44bc935e81d2c15bbf9061b1.dll,#12⤵PID:3180
-