Analysis
-
max time kernel
86s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
0644d63536e535b8561db4b913389857b43eb8ddaeb08e0e949e30c3e3f5c6d8.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
0644d63536e535b8561db4b913389857b43eb8ddaeb08e0e949e30c3e3f5c6d8.dll
Resource
win10v2004-20231020-en
General
-
Target
0644d63536e535b8561db4b913389857b43eb8ddaeb08e0e949e30c3e3f5c6d8.dll
-
Size
156KB
-
MD5
b675f7645109f966541776f1bdb4968b
-
SHA1
7e707ff5e075f28505e9b4288e23132d3dd6c25e
-
SHA256
0644d63536e535b8561db4b913389857b43eb8ddaeb08e0e949e30c3e3f5c6d8
-
SHA512
55efc9357833911bd483febb810002bcf9e2b23a27486bcd097976f03aa807076d8b85655531ee0826003b7b6f9f09306ab4d180bf02f97d8040f8da96342d0e
-
SSDEEP
1536:SCLtTAtL+pRLx+nmOuIlHdNTtsQYhufLh7pyNCQ6DEX+AfI4pQgbrqyHvQytMd9B:SU5vR3cNHfF7pMC/HAfvKQrqmvQyY9B
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4688 wrote to memory of 3296 4688 rundll32.exe 86 PID 4688 wrote to memory of 3296 4688 rundll32.exe 86 PID 4688 wrote to memory of 3296 4688 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0644d63536e535b8561db4b913389857b43eb8ddaeb08e0e949e30c3e3f5c6d8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0644d63536e535b8561db4b913389857b43eb8ddaeb08e0e949e30c3e3f5c6d8.dll,#12⤵PID:3296
-