Analysis
-
max time kernel
183s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 22:10
Static task
static1
Behavioral task
behavioral1
Sample
19ce703b81193f810ddd89d97645f8c8b57dac4139596e87e709f2361293dfae.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19ce703b81193f810ddd89d97645f8c8b57dac4139596e87e709f2361293dfae.dll
Resource
win10v2004-20220812-en
General
-
Target
19ce703b81193f810ddd89d97645f8c8b57dac4139596e87e709f2361293dfae.dll
-
Size
41KB
-
MD5
33f5acec8861d9bd6c90cbe23d61489e
-
SHA1
635c8b16816f77aac0e450a94c872a0f15c30405
-
SHA256
19ce703b81193f810ddd89d97645f8c8b57dac4139596e87e709f2361293dfae
-
SHA512
b1f19bffea632abb3af6c6f0a4c88af9efc3d95eaf091bb2d2920d4d6f0dd12552ab3773884e2e79158132c77fc19313c065db09dcc02701e658a6f58e91e926
-
SSDEEP
768:vaT3qMr9FydR3g+xu0/Hcu5gijuj9HKT43I+SHiv:4aMr9F+7um8EgijMb3Ai
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1984 wrote to memory of 4668 1984 rundll32.exe 78 PID 1984 wrote to memory of 4668 1984 rundll32.exe 78 PID 1984 wrote to memory of 4668 1984 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19ce703b81193f810ddd89d97645f8c8b57dac4139596e87e709f2361293dfae.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19ce703b81193f810ddd89d97645f8c8b57dac4139596e87e709f2361293dfae.dll,#12⤵PID:4668
-