Analysis
-
max time kernel
98s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
2f179f845a20a60944f2963d8b3fcbd553667eb46b2025a8fb2a00771940a97e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2f179f845a20a60944f2963d8b3fcbd553667eb46b2025a8fb2a00771940a97e.dll
Resource
win10v2004-20220901-en
General
-
Target
2f179f845a20a60944f2963d8b3fcbd553667eb46b2025a8fb2a00771940a97e.dll
-
Size
162KB
-
MD5
720d8131664e15e8ee8b3f160fd18930
-
SHA1
fb048916ab9c86f50b02abb60b085e1ee3894e4a
-
SHA256
2f179f845a20a60944f2963d8b3fcbd553667eb46b2025a8fb2a00771940a97e
-
SHA512
b0b3ca158161077fb4b4cfe3b428f3be926e08c0bee2f811464e469301054071abf2dd7ba7b3f31ce5fc7074d2c5cb2ef96ce48f52b2e1c51ccc1a8c34453e8a
-
SSDEEP
1536:GcMT3cHjM527nd218uM0SMSGNsFBvbJ88nrjc:GcMT3sj0sMjMlMmdO8f
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3448 2972 rundll32.exe 84 PID 2972 wrote to memory of 3448 2972 rundll32.exe 84 PID 2972 wrote to memory of 3448 2972 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f179f845a20a60944f2963d8b3fcbd553667eb46b2025a8fb2a00771940a97e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f179f845a20a60944f2963d8b3fcbd553667eb46b2025a8fb2a00771940a97e.dll,#12⤵PID:3448
-