Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
7898557f558e37c8eb4c3bc7bf65822716e1501f2bb432b1a125a8f5ccc1d39f.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7898557f558e37c8eb4c3bc7bf65822716e1501f2bb432b1a125a8f5ccc1d39f.dll
Resource
win10v2004-20230915-en
General
-
Target
7898557f558e37c8eb4c3bc7bf65822716e1501f2bb432b1a125a8f5ccc1d39f.dll
-
Size
85KB
-
MD5
eb9a4ea7a6fdae89296094e541ab8d72
-
SHA1
3889f5b2b67d788f2b305f525a2969b72a8a794e
-
SHA256
7898557f558e37c8eb4c3bc7bf65822716e1501f2bb432b1a125a8f5ccc1d39f
-
SHA512
5114193d6f6c0c39de0922cf8d4f08c09dab72c782afceebc6f1fa66dff7e12d58df2ed138587d114d82d61e017020e3f9328c89ba279c96db86b229bb901824
-
SSDEEP
1536:dVJRYkbq7LciPejzISBTb6gDIOkjj4OqZBKSh+ek3GJ:dVJRYkbq7LcsmMSBX6gDIOkjUOq3jh+R
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3540 2084 rundll32.exe 82 PID 2084 wrote to memory of 3540 2084 rundll32.exe 82 PID 2084 wrote to memory of 3540 2084 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7898557f558e37c8eb4c3bc7bf65822716e1501f2bb432b1a125a8f5ccc1d39f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7898557f558e37c8eb4c3bc7bf65822716e1501f2bb432b1a125a8f5ccc1d39f.dll,#12⤵PID:3540
-