Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2023 14:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
61733b2e02e496718869759dcefe6b60_dll32_JC.dll
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
General
-
Target
61733b2e02e496718869759dcefe6b60_dll32_JC.dll
-
Size
177KB
-
MD5
61733b2e02e496718869759dcefe6b60
-
SHA1
9920e31238aa1af134c12bb4f166f23c698d17ec
-
SHA256
efbcf3521ee0bc7fb274099ec7b5f4dd149d33529cd0dbe014f55ae01533c6e4
-
SHA512
9bd51af1d1af85987abbe9378d3ee8f4fcfbd69fc7ab46cff78d7bebf2ab159f840399493918c676e84d8c2c76c4756255e2bad8c2830fdafd324a0c9e021d9e
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0J:jDgtfRQUHPw06MoV2nwTBlhm8h
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1476 wrote to memory of 4520 1476 rundll32.exe 81 PID 1476 wrote to memory of 4520 1476 rundll32.exe 81 PID 1476 wrote to memory of 4520 1476 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\61733b2e02e496718869759dcefe6b60_dll32_JC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\61733b2e02e496718869759dcefe6b60_dll32_JC.dll,#12⤵PID:4520
-