Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
8175cab7cc175e894deabd74b9281233eb54343af0d376f42c2ff8feeeaefc24.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8175cab7cc175e894deabd74b9281233eb54343af0d376f42c2ff8feeeaefc24.dll
Resource
win10v2004-20220901-en
General
-
Target
8175cab7cc175e894deabd74b9281233eb54343af0d376f42c2ff8feeeaefc24.dll
-
Size
18KB
-
MD5
720e901c5f58c9a9d2f6b314e8c00080
-
SHA1
9d707371ef9acd26da7df453cf9562aac2a9fa48
-
SHA256
8175cab7cc175e894deabd74b9281233eb54343af0d376f42c2ff8feeeaefc24
-
SHA512
b7ab54600ad0a48ed9620a8fd9ef6cbbccb5889dbfcd7bd7e1cee0bea15eb127284336252448296901a2fdd4ee91b1796c2bac9fdc4a1a2d15e3a4321befbd42
-
SSDEEP
384:A95WpssVXWK3sfjyerwGXOiX8fv+jfRZGD2n0Tlybns0tAKfPmmz:9pscWqsme0piq+FJpbnsPKfNz
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2900 wrote to memory of 4808 2900 rundll32.exe 83 PID 2900 wrote to memory of 4808 2900 rundll32.exe 83 PID 2900 wrote to memory of 4808 2900 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8175cab7cc175e894deabd74b9281233eb54343af0d376f42c2ff8feeeaefc24.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8175cab7cc175e894deabd74b9281233eb54343af0d376f42c2ff8feeeaefc24.dll,#12⤵PID:4808
-