Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 22:15
Static task
static1
Behavioral task
behavioral1
Sample
2b8e7f2784d75917d41aa0e2dbcef603658793590202214b59ee1058fa4e6199.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2b8e7f2784d75917d41aa0e2dbcef603658793590202214b59ee1058fa4e6199.dll
Resource
win10v2004-20220812-en
General
-
Target
2b8e7f2784d75917d41aa0e2dbcef603658793590202214b59ee1058fa4e6199.dll
-
Size
686KB
-
MD5
3fae58f27d8a2cc1f49f915bc3f3b4a0
-
SHA1
e76d139b1a8c56ef753f7cf81c1e4ebe1df3ba74
-
SHA256
2b8e7f2784d75917d41aa0e2dbcef603658793590202214b59ee1058fa4e6199
-
SHA512
230f2bed9bd08addc1598e4bb9c4016cb4f1aad2ebeeb6f664105412fb520c08b08da52b142e42408a6e407e3ef6bbc4dc5146ba38e41ec20f0be84c169e16a8
-
SSDEEP
3072:kQYapbGxZ7703lGfB8pn2swPU+ioNFNYqYX55goTwYk+01SNk+4eR0ZDlpzpBJk1:krK6ZW7l8g5go8UB4egGIUugT
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4304 4308 rundll32.exe 83 PID 4308 wrote to memory of 4304 4308 rundll32.exe 83 PID 4308 wrote to memory of 4304 4308 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2b8e7f2784d75917d41aa0e2dbcef603658793590202214b59ee1058fa4e6199.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2b8e7f2784d75917d41aa0e2dbcef603658793590202214b59ee1058fa4e6199.dll,#12⤵PID:4304
-