Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
c18c0cc77883a7b17115aff92afa8db633ec57e2a16225fcf4e8b7f2163ce118.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c18c0cc77883a7b17115aff92afa8db633ec57e2a16225fcf4e8b7f2163ce118.dll
Resource
win10v2004-20220901-en
General
-
Target
c18c0cc77883a7b17115aff92afa8db633ec57e2a16225fcf4e8b7f2163ce118.dll
-
Size
124KB
-
MD5
93cb269e0c8fd9d980c355f1fc6f6d27
-
SHA1
8d2fe0bed8d3790e1de0826fb5a2cada483308f1
-
SHA256
c18c0cc77883a7b17115aff92afa8db633ec57e2a16225fcf4e8b7f2163ce118
-
SHA512
efc921f8e1331a672876fdc89feb0364c84588b65389dcce4cefea7c29bf7b698107a23c26a2977ca462cb7825cfa5e3b4a913afb0d8a2079d5a49ac7b45ff3b
-
SSDEEP
3072:1pTIt9oZWvGEM0WU3++c1hx0VmVpgyGS++M1tPD23a/5:bTIvGEnNMv1pgA+51tPAK
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4124 4236 rundll32.exe 85 PID 4236 wrote to memory of 4124 4236 rundll32.exe 85 PID 4236 wrote to memory of 4124 4236 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c18c0cc77883a7b17115aff92afa8db633ec57e2a16225fcf4e8b7f2163ce118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c18c0cc77883a7b17115aff92afa8db633ec57e2a16225fcf4e8b7f2163ce118.dll,#12⤵PID:4124
-