Analysis
-
max time kernel
149s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 20:03
Static task
static1
Behavioral task
behavioral1
Sample
ac498ecb059b7f46cbd680009e10720da55350e406208cd9a9aa09903f30c76d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac498ecb059b7f46cbd680009e10720da55350e406208cd9a9aa09903f30c76d.dll
Resource
win10v2004-20220812-en
General
-
Target
ac498ecb059b7f46cbd680009e10720da55350e406208cd9a9aa09903f30c76d.dll
-
Size
81KB
-
MD5
37a1cde1718fec4bfc5573d4f44ef660
-
SHA1
a04ce61e9e8d66859b9b693a09a85ce8cfb9f435
-
SHA256
ac498ecb059b7f46cbd680009e10720da55350e406208cd9a9aa09903f30c76d
-
SHA512
6a827edbf5110ede1e8edc67cb4e5b5746cffefab8ddbf7c45178e09ec28b18427406f6cc29f635d0a66bb752abaf5dddb794b6dce10a17b18c0942fa22cb071
-
SSDEEP
1536:/d/tVPlpioezD4BMt1jVsfq6bTBaSk55T6VAQJkfVF:/DVPvCEMt1jVsfq+TwSk55mVfkf
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4756 wrote to memory of 4188 4756 rundll32.exe 82 PID 4756 wrote to memory of 4188 4756 rundll32.exe 82 PID 4756 wrote to memory of 4188 4756 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac498ecb059b7f46cbd680009e10720da55350e406208cd9a9aa09903f30c76d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac498ecb059b7f46cbd680009e10720da55350e406208cd9a9aa09903f30c76d.dll,#12⤵PID:4188
-