Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 15:08
Behavioral task
behavioral1
Sample
fb629e5b76c8ee09f202bb60a0dfcde5ef0a1cbf59fdd101fcf46098859c861d.dll
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
fb629e5b76c8ee09f202bb60a0dfcde5ef0a1cbf59fdd101fcf46098859c861d.dll
Resource
win10v2004-20230915-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
fb629e5b76c8ee09f202bb60a0dfcde5ef0a1cbf59fdd101fcf46098859c861d.dll
-
Size
6.8MB
-
MD5
fe701f565c09640203e605ccf910650f
-
SHA1
93d80227184597b03766d218a7b959e404fe982c
-
SHA256
fb629e5b76c8ee09f202bb60a0dfcde5ef0a1cbf59fdd101fcf46098859c861d
-
SHA512
c01708615032208786616af0d5bb853bdc98220f92e23447fd6c41f108e15442bdf2bb5f8234f6748b3f691e8fd7a6f3e3130df259d7b456f1a858f8b6547777
-
SSDEEP
196608:eOfHnq8W5CNoI2jTRU1/tzH+OoBFyYz/R:tvAIgtUjT+OEF
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3684 wrote to memory of 4788 3684 rundll32.exe 82 PID 3684 wrote to memory of 4788 3684 rundll32.exe 82 PID 3684 wrote to memory of 4788 3684 rundll32.exe 82 PID 4788 wrote to memory of 824 4788 rundll32.exe 84 PID 4788 wrote to memory of 824 4788 rundll32.exe 84 PID 4788 wrote to memory of 824 4788 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb629e5b76c8ee09f202bb60a0dfcde5ef0a1cbf59fdd101fcf46098859c861d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb629e5b76c8ee09f202bb60a0dfcde5ef0a1cbf59fdd101fcf46098859c861d.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe fghre hidio gsdee3⤵PID:824
-
-