Resubmissions
26/12/2023, 16:24
231226-twbvsaccf4 326/12/2023, 16:15
231226-tqnx6ahgal 1029/01/2022, 23:00
220129-2yznmabeg7 1Analysis
-
max time kernel
119s -
max time network
164s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
26/12/2023, 16:15
Behavioral task
behavioral1
Sample
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a.dll
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a.dll
Resource
win11-20231215-en
General
-
Target
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a.dll
-
Size
585KB
-
MD5
4582d9d2120fb9c80ef01e2135fa3515
-
SHA1
5da5079754d975d5b04342abf9d60bd0bae181a0
-
SHA256
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a
-
SHA512
9817c5a643bae89340dc4900851291866a3607e84c446f690032e64818c2a08483d056436206c55ea0eeb8b8f0c47761dcc976d08d75dee0df6580a8f18a6319
-
SSDEEP
12288:n1YswqlXRo/XlXSL4Fw+jo8x0cnmZMLU5tBgF8:1llXW/XRSL4Fw+jDx0cmT5DgF8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1820 wrote to memory of 4536 1820 rundll32.exe 73 PID 1820 wrote to memory of 4536 1820 rundll32.exe 73 PID 1820 wrote to memory of 4536 1820 rundll32.exe 73
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a.dll,#12⤵PID:4536
-