Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 10:45
Static task
static1
Behavioral task
behavioral1
Sample
f68f7357c3aec8b961291509b7a65dce0f618cdf4818720d307e8e7ab835592c.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f68f7357c3aec8b961291509b7a65dce0f618cdf4818720d307e8e7ab835592c.dll
Resource
win10v2004-20220901-en
General
-
Target
f68f7357c3aec8b961291509b7a65dce0f618cdf4818720d307e8e7ab835592c.dll
-
Size
389KB
-
MD5
6d32b6fb17f3037058141f4339927130
-
SHA1
5193571dac416a09e019868b2782d40d5e1774ee
-
SHA256
f68f7357c3aec8b961291509b7a65dce0f618cdf4818720d307e8e7ab835592c
-
SHA512
2a22c678d2852167d9df26c7882b0021418d669ed6d092564bfed1374e9f2ed208f3c5921605cd27a9b426105877a1436477721c7c8f1b6ad11389645631a091
-
SSDEEP
6144:10p44pXWWOAZEKW7UsY6OiaQen0VQ8NYazJYuAcSWqis/2GXaidsiVwuARr1+l:opXWW5ZEKxsYx07NYvWmeb1U
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5080 wrote to memory of 5012 5080 rundll32.exe 83 PID 5080 wrote to memory of 5012 5080 rundll32.exe 83 PID 5080 wrote to memory of 5012 5080 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f68f7357c3aec8b961291509b7a65dce0f618cdf4818720d307e8e7ab835592c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f68f7357c3aec8b961291509b7a65dce0f618cdf4818720d307e8e7ab835592c.dll,#12⤵PID:5012
-