Analysis
-
max time kernel
111s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
be0b3db5b60a6a688357a4eef01bd4be3cf407af05ae1c9239867286d0763872.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be0b3db5b60a6a688357a4eef01bd4be3cf407af05ae1c9239867286d0763872.dll
Resource
win10v2004-20220901-en
General
-
Target
be0b3db5b60a6a688357a4eef01bd4be3cf407af05ae1c9239867286d0763872.dll
-
Size
238KB
-
MD5
51424766925292e6ade2aa4623c67640
-
SHA1
9d5b65da3ed0fd546d69b992ad57cad9c68f640a
-
SHA256
be0b3db5b60a6a688357a4eef01bd4be3cf407af05ae1c9239867286d0763872
-
SHA512
a2e7ca0f8748d3a3296bbc8b723bce6e44a702a4586b6cb33c6b539260892210cd5047162f1df13f5a55eeda455f57a8fc1d0a3dc2e71c48e569524c76e08afe
-
SSDEEP
3072:pCeSytuUr0C/fqCIgYbmdDGALpxnx/Y1SzSl61CbPKhqbNgw1+VtVCrVkobhW4MS:p2QuUxpo0DXLpxZT1qXC6504MC80Y90
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 636 4888 rundll32.exe 82 PID 4888 wrote to memory of 636 4888 rundll32.exe 82 PID 4888 wrote to memory of 636 4888 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be0b3db5b60a6a688357a4eef01bd4be3cf407af05ae1c9239867286d0763872.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be0b3db5b60a6a688357a4eef01bd4be3cf407af05ae1c9239867286d0763872.dll,#12⤵PID:636
-