Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
32267d1935d3902ceccd89596c49e7b89c435c37ac100595a3d0a248c25ddc82.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
32267d1935d3902ceccd89596c49e7b89c435c37ac100595a3d0a248c25ddc82.dll
Resource
win10v2004-20230915-en
General
-
Target
32267d1935d3902ceccd89596c49e7b89c435c37ac100595a3d0a248c25ddc82.dll
-
Size
603KB
-
MD5
d78e3379a6f3e59f8213caa5e02f3a3f
-
SHA1
ee36b9f63d8ad43960ed2bce29e76dd261af19de
-
SHA256
32267d1935d3902ceccd89596c49e7b89c435c37ac100595a3d0a248c25ddc82
-
SHA512
53e236b393299d6a3b90770fd023faea102c11b4a46e84fa43ab4eec71d318c15d9c2ee69a16940d72adcdd3185d0c1342b724fed55145a27ddf7aa1688007a3
-
SSDEEP
12288:O54ll3aa9xARFm0PJOFYSIT91C7nST7BjvrEH7XkF:O54H3G6IT91C7nSTBrEH7Xy
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5012 wrote to memory of 4696 5012 rundll32.exe 74 PID 5012 wrote to memory of 4696 5012 rundll32.exe 74 PID 5012 wrote to memory of 4696 5012 rundll32.exe 74
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32267d1935d3902ceccd89596c49e7b89c435c37ac100595a3d0a248c25ddc82.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32267d1935d3902ceccd89596c49e7b89c435c37ac100595a3d0a248c25ddc82.dll,#12⤵PID:4696
-