Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2023, 11:57
Static task
static1
Behavioral task
behavioral1
Sample
f1cd61b908809b95286b1e8e06ae1475d1eddcc071f2a6da21892dc3489e092b.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f1cd61b908809b95286b1e8e06ae1475d1eddcc071f2a6da21892dc3489e092b.dll
Resource
win10v2004-20231020-en
General
-
Target
f1cd61b908809b95286b1e8e06ae1475d1eddcc071f2a6da21892dc3489e092b.dll
-
Size
450KB
-
MD5
b7b88dcd54f740e3dfc1daf98c4d6e9d
-
SHA1
0cf9b1635de47bc7f3d58b638aad77d4c0604c31
-
SHA256
f1cd61b908809b95286b1e8e06ae1475d1eddcc071f2a6da21892dc3489e092b
-
SHA512
5ec09d1d35c5861487e8f0e68f140480e4f1968489fc690a3e564a8a023ffb2f5fbbfc585a3ecbde77bddbc1715b347ee3dcca035c8fe040b4b70262c5933260
-
SSDEEP
12288:bMnJqukCM4usJPisu/cpL+kdMwytb+6byxZVNDBjvrEH7n:bMnJGkp9ytb+6by53rEH7n
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 448 220 rundll32.exe 80 PID 220 wrote to memory of 448 220 rundll32.exe 80 PID 220 wrote to memory of 448 220 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1cd61b908809b95286b1e8e06ae1475d1eddcc071f2a6da21892dc3489e092b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1cd61b908809b95286b1e8e06ae1475d1eddcc071f2a6da21892dc3489e092b.dll,#12⤵PID:448
-