Analysis
-
max time kernel
155s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
704d20312b7be0aa05ac9c1465dec3de68f14a829ef6e28ec0018451a7354bd3.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
704d20312b7be0aa05ac9c1465dec3de68f14a829ef6e28ec0018451a7354bd3.dll
Resource
win10v2004-20231215-en
General
-
Target
704d20312b7be0aa05ac9c1465dec3de68f14a829ef6e28ec0018451a7354bd3.dll
-
Size
2.0MB
-
MD5
1b763bd562e1b99d21c5dab7965ab428
-
SHA1
8edea1c9ba657902afcf2dadc0c31d8667da142e
-
SHA256
704d20312b7be0aa05ac9c1465dec3de68f14a829ef6e28ec0018451a7354bd3
-
SHA512
68f03d5b3092ad8777e1609ff3300afad148ef0bbc02bf72cb86dc8e1b4ec674117383124061dd5e2735f65f7e0fa2dc1aa775aaf3f962f4abec97b92400719c
-
SSDEEP
24576:cYG7K9TL9iSQCDv8ivLDgpYpk9MRS+MKMG5PG4t1RwLs57kcJrVhW4LfmiMg9fvH:cNe0JCDCpmqOSBDLsrJpNzmLg9fvwC
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 872 wrote to memory of 4680 872 rundll32.exe 88 PID 872 wrote to memory of 4680 872 rundll32.exe 88 PID 872 wrote to memory of 4680 872 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\704d20312b7be0aa05ac9c1465dec3de68f14a829ef6e28ec0018451a7354bd3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\704d20312b7be0aa05ac9c1465dec3de68f14a829ef6e28ec0018451a7354bd3.dll,#12⤵PID:4680
-