Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
f87ad0eb2aa73bdcfa049eec34d1164b5a8efdaaa33e74675bc345ef21f3ee6e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f87ad0eb2aa73bdcfa049eec34d1164b5a8efdaaa33e74675bc345ef21f3ee6e.dll
Resource
win10v2004-20220812-en
General
-
Target
f87ad0eb2aa73bdcfa049eec34d1164b5a8efdaaa33e74675bc345ef21f3ee6e.dll
-
Size
167KB
-
MD5
79e11663bedba915edbdd9d8623e3a6e
-
SHA1
17e1ef366cd99ed5a6016f5d2c12b83d2fed46f8
-
SHA256
f87ad0eb2aa73bdcfa049eec34d1164b5a8efdaaa33e74675bc345ef21f3ee6e
-
SHA512
0cfd8c69e81b4862392194004f86e1daa99d0d8b28889b143752ecaa3ad682a04d29b1576d726b08cf30f2d9b754a9b3869902ad40120eda5e591a0339253aa1
-
SSDEEP
3072:cl24GWAUzoA/L5k/oejnd7cKpn6njB+FUGObg7sG6rj2r7qxY8m2X:c8WAwoh/oSVxQVEV7qriQBme
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1680 1348 rundll32.exe 81 PID 1348 wrote to memory of 1680 1348 rundll32.exe 81 PID 1348 wrote to memory of 1680 1348 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f87ad0eb2aa73bdcfa049eec34d1164b5a8efdaaa33e74675bc345ef21f3ee6e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f87ad0eb2aa73bdcfa049eec34d1164b5a8efdaaa33e74675bc345ef21f3ee6e.dll,#12⤵PID:1680
-