Analysis
-
max time kernel
132s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2023 15:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c1e9bede046557e251ef348439042fa0_dll32_JC.dll
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
General
-
Target
c1e9bede046557e251ef348439042fa0_dll32_JC.dll
-
Size
617KB
-
MD5
c1e9bede046557e251ef348439042fa0
-
SHA1
4999f9d375e0e0f2c9b9f40369118be90c69578e
-
SHA256
6e55957dcea836871bae4c2d3711dd6ff50f432df8ec1ec290c96413660926eb
-
SHA512
dfaf23d0127697270457f80dc94f089b58d03fe54769346058048da5249aaed6c6e6d1a19b2cdeb128f84cbf006712603240c33a5d0f21c17133d32eecc6e96e
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0y:jDgtfRQUHPw06MoV2nwTBlhm8a
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1200 3068 rundll32.exe 81 PID 3068 wrote to memory of 1200 3068 rundll32.exe 81 PID 3068 wrote to memory of 1200 3068 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1e9bede046557e251ef348439042fa0_dll32_JC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1e9bede046557e251ef348439042fa0_dll32_JC.dll,#12⤵PID:1200
-