Analysis
-
max time kernel
87s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
bd001597e0e0a67e819bbce680b97170d395a444c81286646d376ca96209b5b8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd001597e0e0a67e819bbce680b97170d395a444c81286646d376ca96209b5b8.dll
Resource
win10v2004-20220901-en
General
-
Target
bd001597e0e0a67e819bbce680b97170d395a444c81286646d376ca96209b5b8.dll
-
Size
131KB
-
MD5
1cde9aab8bf8ad0338828f6c15b88560
-
SHA1
e351244caa84f3202283d5d7808d26c1e845e340
-
SHA256
bd001597e0e0a67e819bbce680b97170d395a444c81286646d376ca96209b5b8
-
SHA512
3dc160d0c6fa759d40eb19566ee884d4cded15ca185aabdbfb63f40b4db481970556ac3d2e329d9493bfadafb5a92e46e480aca7078758a4fbc3bbd01b743568
-
SSDEEP
3072:+hmd6kQ9aY0RETQjqY4DecF4/QytgLA0QzFcr5rtolNAZEd:+I9Y0RETPFxA+A0QiylGG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 424 wrote to memory of 4544 424 rundll32.exe 84 PID 424 wrote to memory of 4544 424 rundll32.exe 84 PID 424 wrote to memory of 4544 424 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd001597e0e0a67e819bbce680b97170d395a444c81286646d376ca96209b5b8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd001597e0e0a67e819bbce680b97170d395a444c81286646d376ca96209b5b8.dll,#12⤵PID:4544
-