Analysis
-
max time kernel
77s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2022, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
318e3609376f238dff06f25e40e8ad7463c2c92356cf14bfc56f9bafc7bd9a02.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
318e3609376f238dff06f25e40e8ad7463c2c92356cf14bfc56f9bafc7bd9a02.dll
Resource
win10v2004-20220901-en
General
-
Target
318e3609376f238dff06f25e40e8ad7463c2c92356cf14bfc56f9bafc7bd9a02.dll
-
Size
27KB
-
MD5
d0dbb6a5f4828710959a7adf7e3a04bc
-
SHA1
88e4a15f30d8479ef730f095d6f2e4facc734231
-
SHA256
318e3609376f238dff06f25e40e8ad7463c2c92356cf14bfc56f9bafc7bd9a02
-
SHA512
88f69e5ab65e496ed61a282a2d15b545b8a461551abfbdda9fc24e3200281433901a73e66aab56d415e5fc2ec0fd5a7f6c9bf6a194fc64c6bf406be39f46b1be
-
SSDEEP
384:mPsn1WZTrbEwsX79zo9O4z0Z3o2D8vFKgWE0ytuBBQARQkuofVcVRj:mPsn229O78Y2D6FYNBBQARQkpfVcVR
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4204 wrote to memory of 4964 4204 rundll32.exe 83 PID 4204 wrote to memory of 4964 4204 rundll32.exe 83 PID 4204 wrote to memory of 4964 4204 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\318e3609376f238dff06f25e40e8ad7463c2c92356cf14bfc56f9bafc7bd9a02.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\318e3609376f238dff06f25e40e8ad7463c2c92356cf14bfc56f9bafc7bd9a02.dll,#12⤵PID:4964
-