Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2022 23:23
Static task
static1
Behavioral task
behavioral1
Sample
0f283753bc3c05b80953d4062c194d3c6e0611db21849f548f1555e78699f339.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0f283753bc3c05b80953d4062c194d3c6e0611db21849f548f1555e78699f339.dll
Resource
win10v2004-20220812-en
General
-
Target
0f283753bc3c05b80953d4062c194d3c6e0611db21849f548f1555e78699f339.dll
-
Size
36KB
-
MD5
16d6dc5d0bd4d0a65f1155de6d45f383
-
SHA1
499b67b2deb5e3f3c83b44ca3fc318274a9b0b5d
-
SHA256
0f283753bc3c05b80953d4062c194d3c6e0611db21849f548f1555e78699f339
-
SHA512
e30ec33ae3d90ba035f0b9a4aefc6fedda08cae945ef20f5e51c4c0db852b4c32ddb46e4f97284271782e5b1c3f43b30de56a8262bddda5cbbc3a05c23196ebc
-
SSDEEP
768:RT1BNCkK5gVGxlaZql9J1oT1cIg7/fO3+a5hCDKR4plx85/t:JnNCl5X/J12y5736+4QWR4pzUV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4176 wrote to memory of 396 4176 rundll32.exe 79 PID 4176 wrote to memory of 396 4176 rundll32.exe 79 PID 4176 wrote to memory of 396 4176 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f283753bc3c05b80953d4062c194d3c6e0611db21849f548f1555e78699f339.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f283753bc3c05b80953d4062c194d3c6e0611db21849f548f1555e78699f339.dll,#12⤵PID:396
-