Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 21:29
Static task
static1
Behavioral task
behavioral1
Sample
01db3adb21b108ca798ad53e193657b4e42e15596b2d1e52408cacfe7c8c600c.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
01db3adb21b108ca798ad53e193657b4e42e15596b2d1e52408cacfe7c8c600c.dll
Resource
win10v2004-20230915-en
General
-
Target
01db3adb21b108ca798ad53e193657b4e42e15596b2d1e52408cacfe7c8c600c.dll
-
Size
607KB
-
MD5
136a6d931d6b243cbfed5506e492367f
-
SHA1
5cae91b4c4938b04abcb8ea762ece3f2c6cdac3e
-
SHA256
01db3adb21b108ca798ad53e193657b4e42e15596b2d1e52408cacfe7c8c600c
-
SHA512
f8de36a507dc88362877c964e5830148a43d2d434b98d95be5682edfcdc3c3a8f2028cf9d00f4e9c7f43b0e5091bbea94098cf0b040c8aee714f2274040e4a47
-
SSDEEP
12288:G8ZREV/0UyMM9xAWRWoyl4YScTnfIoIAUWwBjvrEH7oV:G2REV/0UyFQOcTnfI9LWyrEH7oV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2400 3044 rundll32.exe 28 PID 3044 wrote to memory of 2400 3044 rundll32.exe 28 PID 3044 wrote to memory of 2400 3044 rundll32.exe 28 PID 3044 wrote to memory of 2400 3044 rundll32.exe 28 PID 3044 wrote to memory of 2400 3044 rundll32.exe 28 PID 3044 wrote to memory of 2400 3044 rundll32.exe 28 PID 3044 wrote to memory of 2400 3044 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\01db3adb21b108ca798ad53e193657b4e42e15596b2d1e52408cacfe7c8c600c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\01db3adb21b108ca798ad53e193657b4e42e15596b2d1e52408cacfe7c8c600c.dll,#12⤵PID:2400
-