Analysis
-
max time kernel
104s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
8fc469bdf2df35082bac05e485797dfdd78dde66321a19b7e00709872d649ddf.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8fc469bdf2df35082bac05e485797dfdd78dde66321a19b7e00709872d649ddf.dll
Resource
win10v2004-20220812-en
General
-
Target
8fc469bdf2df35082bac05e485797dfdd78dde66321a19b7e00709872d649ddf.dll
-
Size
112KB
-
MD5
49c3dd2f0553dafd19787f6a6e1d4165
-
SHA1
46a277517fdec78183ba19c2eb05b9f17cdffc21
-
SHA256
8fc469bdf2df35082bac05e485797dfdd78dde66321a19b7e00709872d649ddf
-
SHA512
13d1d2ea44cf2f36e864adda1fdeed872f4c898e61e9e171620c25baa6aac1c83b8f7c2229cf4c337176b3c234a729ff8bf649d945640caf4d0f570e2b63f967
-
SSDEEP
1536:jt+xVKz+tjjibQRmNWYjA0tFf35N9gSk89sTNwqBbqdADt7I628q2uN8Ials5VRz:jCwz+tnHYZ0wfFgSk7T+qBGE3FmBD+Vy
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3688 wrote to memory of 1572 3688 rundll32.exe 82 PID 3688 wrote to memory of 1572 3688 rundll32.exe 82 PID 3688 wrote to memory of 1572 3688 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8fc469bdf2df35082bac05e485797dfdd78dde66321a19b7e00709872d649ddf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8fc469bdf2df35082bac05e485797dfdd78dde66321a19b7e00709872d649ddf.dll,#12⤵PID:1572
-