Analysis
-
max time kernel
135s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
f47b12387e3eaf9abea7e1ae9cdb6852f1d836919705bf714e616c22e88930ab.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f47b12387e3eaf9abea7e1ae9cdb6852f1d836919705bf714e616c22e88930ab.dll
Resource
win10v2004-20220812-en
General
-
Target
f47b12387e3eaf9abea7e1ae9cdb6852f1d836919705bf714e616c22e88930ab.dll
-
Size
176KB
-
MD5
24c562a5ccf043d7d44ea3cc53cb0661
-
SHA1
a6f872eed0eb048c907b312fa8f93b15beaf377f
-
SHA256
f47b12387e3eaf9abea7e1ae9cdb6852f1d836919705bf714e616c22e88930ab
-
SHA512
cdc78c88ba1096a66a7814dfcd2dbcfc9533e7ff7294e840983ed7fd13954d982cc587418afe2e0f32c620cedc8c409669db2f6635c3eb2722910cb461d576d2
-
SSDEEP
3072:sH6ffM2v9WwSxTZ6bxgAubOm/gTtjnD+LDrL8lrCamsIKppqEMxFb2:sH6HZF9SxTZ6bqAuTktLD+LDr6ChhTb
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 64 wrote to memory of 5004 64 rundll32.exe 81 PID 64 wrote to memory of 5004 64 rundll32.exe 81 PID 64 wrote to memory of 5004 64 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f47b12387e3eaf9abea7e1ae9cdb6852f1d836919705bf714e616c22e88930ab.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f47b12387e3eaf9abea7e1ae9cdb6852f1d836919705bf714e616c22e88930ab.dll,#12⤵PID:5004
-