Analysis
-
max time kernel
191s -
max time network
255s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
01-01-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
a018d1855015e0e2b2fb3caf93274a9090ad1ff0ed358ce99a61fcecf708f33f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a018d1855015e0e2b2fb3caf93274a9090ad1ff0ed358ce99a61fcecf708f33f.dll
Resource
win10-20231215-en
General
-
Target
a018d1855015e0e2b2fb3caf93274a9090ad1ff0ed358ce99a61fcecf708f33f.dll
-
Size
2.4MB
-
MD5
0776440319a6a8bcaa1abb698a29f6d8
-
SHA1
2a88892e4b269304fd8b5691b82042d6da4a6202
-
SHA256
a018d1855015e0e2b2fb3caf93274a9090ad1ff0ed358ce99a61fcecf708f33f
-
SHA512
cdb1b79f26bc9b7c56dd2c6d704aea241010cb663510560c95a4d180d9cdad6f72f43b31ff29bac049f600b86e5cc73abe37e352f0be420c18f39d5e8aced78c
-
SSDEEP
49152:fZVaoXPXhz5Kux8eklz6oVV+up9F3SNlB5LtOmS3BAh2VK5KvWd:f3aofxz5KuOeYD+ubQXB5LtOf85Kvi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4756 wrote to memory of 308 4756 rundll32.exe 73 PID 4756 wrote to memory of 308 4756 rundll32.exe 73 PID 4756 wrote to memory of 308 4756 rundll32.exe 73
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a018d1855015e0e2b2fb3caf93274a9090ad1ff0ed358ce99a61fcecf708f33f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a018d1855015e0e2b2fb3caf93274a9090ad1ff0ed358ce99a61fcecf708f33f.dll,#12⤵PID:308
-