Analysis
-
max time kernel
158s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 11:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a23a61657075073d7df65fb81832d3bbd12c82eb36959d7b3197816e693e5fb5.dll
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a23a61657075073d7df65fb81832d3bbd12c82eb36959d7b3197816e693e5fb5.dll
Resource
win10v2004-20230915-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a23a61657075073d7df65fb81832d3bbd12c82eb36959d7b3197816e693e5fb5.dll
-
Size
196KB
-
MD5
7c04af6b1b565060a7c4ce192cb6966d
-
SHA1
b331448dfee7d5e3507f0051fc603f3ab1787bb7
-
SHA256
a23a61657075073d7df65fb81832d3bbd12c82eb36959d7b3197816e693e5fb5
-
SHA512
14af14288818cb45f98d4b4c3076b07b755b31998a844cc9af8f1552c4ac3c7c67e83fe1801027f50b163ff475c7cee273c6e1d1d46267ab54705480de25aef6
-
SSDEEP
6144:5Bz9Nt9vfbb9xVMgkzLXpItI3xiLiYCz:fpNt9v/9sgyaS3xiLiYCz
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4420 5044 rundll32.exe 85 PID 5044 wrote to memory of 4420 5044 rundll32.exe 85 PID 5044 wrote to memory of 4420 5044 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a23a61657075073d7df65fb81832d3bbd12c82eb36959d7b3197816e693e5fb5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a23a61657075073d7df65fb81832d3bbd12c82eb36959d7b3197816e693e5fb5.dll,#12⤵PID:4420
-