Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
3c8695559afdb091dabaf800981cced85fd8f464396f3c58579fb6c4397d12d2.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3c8695559afdb091dabaf800981cced85fd8f464396f3c58579fb6c4397d12d2.dll
Resource
win10v2004-20231215-en
General
-
Target
3c8695559afdb091dabaf800981cced85fd8f464396f3c58579fb6c4397d12d2.dll
-
Size
1.4MB
-
MD5
303620153304475c81bb66b67a80b687
-
SHA1
0ca4143ac7e0c6b4fc9046102c6df518176b2daf
-
SHA256
3c8695559afdb091dabaf800981cced85fd8f464396f3c58579fb6c4397d12d2
-
SHA512
42d766d5d865daa3feee731902adaf4d1b85caf5443eb1c1d03d00404fff6f8a132b527281b364a24535b0d2976aeb09763c92b79045326b10c3c9249dfc8fc4
-
SSDEEP
24576:6lRiC4LNTuS6mkSVQ8vbuSMCdh7oHZUjBNYD3k/uR:6bi4SvDuTGhEHZUjBmR
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4564 wrote to memory of 4396 4564 rundll32.exe 88 PID 4564 wrote to memory of 4396 4564 rundll32.exe 88 PID 4564 wrote to memory of 4396 4564 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c8695559afdb091dabaf800981cced85fd8f464396f3c58579fb6c4397d12d2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c8695559afdb091dabaf800981cced85fd8f464396f3c58579fb6c4397d12d2.dll,#12⤵PID:4396
-