Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
ce71e81474e461c21b3f48fac3b6e382457eddfc36d3eeff96744781904c4219.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce71e81474e461c21b3f48fac3b6e382457eddfc36d3eeff96744781904c4219.dll
Resource
win10v2004-20220901-en
General
-
Target
ce71e81474e461c21b3f48fac3b6e382457eddfc36d3eeff96744781904c4219.dll
-
Size
73KB
-
MD5
677477019b4427d6ba12921779b38228
-
SHA1
5cee636775159ed44d3bf23751668d47a4f668f5
-
SHA256
ce71e81474e461c21b3f48fac3b6e382457eddfc36d3eeff96744781904c4219
-
SHA512
91b468ccebe226802eaaffab5862d1f295384470225a500bdd78e3b828894c378163217775214935e1ff79980d4f76d8a2f9db22d9550b76335f4a0c6dd1405e
-
SSDEEP
1536:AEHza9zU6APhYqryC+xgER/99jU2HCgW0yKVS7FjQu847vN:A0EsuqTAH/upQxYvN
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2072 2164 rundll32.exe 82 PID 2164 wrote to memory of 2072 2164 rundll32.exe 82 PID 2164 wrote to memory of 2072 2164 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce71e81474e461c21b3f48fac3b6e382457eddfc36d3eeff96744781904c4219.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce71e81474e461c21b3f48fac3b6e382457eddfc36d3eeff96744781904c4219.dll,#12⤵PID:2072
-