Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
fd9a263ff67296719d2537339082a222b9957ce993cf71acf2df512da8a8530e.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fd9a263ff67296719d2537339082a222b9957ce993cf71acf2df512da8a8530e.dll
Resource
win10v2004-20230915-en
General
-
Target
fd9a263ff67296719d2537339082a222b9957ce993cf71acf2df512da8a8530e.dll
-
Size
5.2MB
-
MD5
979d26433dfc0c812e59750d7c5f14c0
-
SHA1
48512e48a875dcff9e14802daa70bfa4be08ac5d
-
SHA256
fd9a263ff67296719d2537339082a222b9957ce993cf71acf2df512da8a8530e
-
SHA512
25588cb004739a7b117fdbce14f098967affed656d7d72742de13c1cf041d5036069a9921270b978e9bce11ae556e3c3c7091958f404db87a67e27655a76a09b
-
SSDEEP
98304:wBN7s0E5nmbM6Ucqb6OXc5CGTMOY/N+1sDigUriK1cktGehkZ:wBKVJb6OM5eD3qcDehw
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4368 wrote to memory of 1244 4368 rundll32.exe 83 PID 4368 wrote to memory of 1244 4368 rundll32.exe 83 PID 4368 wrote to memory of 1244 4368 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd9a263ff67296719d2537339082a222b9957ce993cf71acf2df512da8a8530e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd9a263ff67296719d2537339082a222b9957ce993cf71acf2df512da8a8530e.dll,#12⤵PID:1244
-