Analysis
-
max time kernel
133s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
0fde1ca68e2b278cbe03c7b95e6424c6caf58b2359252ae921b2337b8ee0f8b4.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0fde1ca68e2b278cbe03c7b95e6424c6caf58b2359252ae921b2337b8ee0f8b4.dll
Resource
win10v2004-20230915-en
General
-
Target
0fde1ca68e2b278cbe03c7b95e6424c6caf58b2359252ae921b2337b8ee0f8b4.dll
-
Size
576KB
-
MD5
4d4db1a0c9190c8940cf17b0bbdf1a0c
-
SHA1
1fd34f9e529c95ec74dbf7e2f2e5766daa88aa8c
-
SHA256
0fde1ca68e2b278cbe03c7b95e6424c6caf58b2359252ae921b2337b8ee0f8b4
-
SHA512
6a654cbda95c7369401e43e57e41d8ad11e8e30eb64be1506bd3a0c444462080403d89c015656363334e73ff2abd4c9ce3d220498209060f6d141be6486ba5c9
-
SSDEEP
12288:fLEvzbuLGY0uFH/tVchXttY+wysstw3PR4k7C6JcqSE98evlvlA3:TEXubcO+foJ4k2098et23
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1976 wrote to memory of 3668 1976 rundll32.exe 86 PID 1976 wrote to memory of 3668 1976 rundll32.exe 86 PID 1976 wrote to memory of 3668 1976 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fde1ca68e2b278cbe03c7b95e6424c6caf58b2359252ae921b2337b8ee0f8b4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fde1ca68e2b278cbe03c7b95e6424c6caf58b2359252ae921b2337b8ee0f8b4.dll,#12⤵PID:3668
-