Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2023 04:00
Static task
static1
Behavioral task
behavioral1
Sample
a8e5a8432633cc0b22e6b505be9336ad7dad688cd03ccece3725221034c82cf3.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a8e5a8432633cc0b22e6b505be9336ad7dad688cd03ccece3725221034c82cf3.dll
Resource
win10v2004-20231023-en
General
-
Target
a8e5a8432633cc0b22e6b505be9336ad7dad688cd03ccece3725221034c82cf3.dll
-
Size
340KB
-
MD5
547cf1bf7a1e2ea621a9fe8ad79b3332
-
SHA1
b690b8bf57a20aa1b5174c2be42445000db90151
-
SHA256
a8e5a8432633cc0b22e6b505be9336ad7dad688cd03ccece3725221034c82cf3
-
SHA512
56b0eaa2ecae5765dcaadcc5981e591606397098c8b6c8a7a192cc41d59e239bc997879c565e08c5cd7fddded0d58bc00d3956eb260f6439fd3da6ef59e5a8fa
-
SSDEEP
6144:/fsq85MgM2Dg4Vrs9NXS851S3xzKsSoUTCTlUho6I/m:cHM2tVrs3XB5KKvoSo6I+
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1360 wrote to memory of 4004 1360 rundll32.exe 86 PID 1360 wrote to memory of 4004 1360 rundll32.exe 86 PID 1360 wrote to memory of 4004 1360 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a8e5a8432633cc0b22e6b505be9336ad7dad688cd03ccece3725221034c82cf3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a8e5a8432633cc0b22e6b505be9336ad7dad688cd03ccece3725221034c82cf3.dll,#12⤵PID:4004
-