Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
2de1e95b1015aa6f2827cb4f5a46c7efb42395712c236b9cebca70550b29e5eb.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2de1e95b1015aa6f2827cb4f5a46c7efb42395712c236b9cebca70550b29e5eb.dll
Resource
win10v2004-20231127-en
General
-
Target
2de1e95b1015aa6f2827cb4f5a46c7efb42395712c236b9cebca70550b29e5eb.dll
-
Size
528KB
-
MD5
630dab086fa642da8386a42b53c9f0dd
-
SHA1
8c7ffa90594eb7167388ce7f117d22070e23938a
-
SHA256
2de1e95b1015aa6f2827cb4f5a46c7efb42395712c236b9cebca70550b29e5eb
-
SHA512
a837555babed9188280080ba8907dd2ee75dac87603fcd733e8f79ef799d29e24c5d616324d598e3c0be6b72d5c93e428ee2bf7b68b09cb9022c1e16959e83c6
-
SSDEEP
12288:9sGD8tu/sI5uk249x4C6cBJ5c4zBd3X3u8g:93DVNT249jBJRzBd3X3I
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4472 wrote to memory of 5036 4472 rundll32.exe 85 PID 4472 wrote to memory of 5036 4472 rundll32.exe 85 PID 4472 wrote to memory of 5036 4472 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2de1e95b1015aa6f2827cb4f5a46c7efb42395712c236b9cebca70550b29e5eb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2de1e95b1015aa6f2827cb4f5a46c7efb42395712c236b9cebca70550b29e5eb.dll,#12⤵PID:5036
-