Analysis
-
max time kernel
165s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 22:41
Static task
static1
Behavioral task
behavioral1
Sample
6f85c3940eb2708c298bd174cdd10de05533f1f413119dd0c1a5d6273dc50c27.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f85c3940eb2708c298bd174cdd10de05533f1f413119dd0c1a5d6273dc50c27.dll
Resource
win10v2004-20220812-en
General
-
Target
6f85c3940eb2708c298bd174cdd10de05533f1f413119dd0c1a5d6273dc50c27.dll
-
Size
332KB
-
MD5
6eb533a1ec4dda90696c85a8a5fca50f
-
SHA1
07435b8a8014ce0eadc91021a0e149687292bf79
-
SHA256
6f85c3940eb2708c298bd174cdd10de05533f1f413119dd0c1a5d6273dc50c27
-
SHA512
fc6365c9e08c0c1d1ed0c15ea0d36b8e53ae14a5dddd4eb521b64e95455d33bb9924be592b2e9f33d96ad66096eb007b5e732fd97c94ee47eaef59c2213c8d39
-
SSDEEP
6144:vv8PUMn9u7tVwzthzLw1I/u1tHxgIh5nQCrOOOkoH:McM9u7za5U1Im3pHQCaOOfH
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4932 wrote to memory of 4252 4932 rundll32.exe 82 PID 4932 wrote to memory of 4252 4932 rundll32.exe 82 PID 4932 wrote to memory of 4252 4932 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f85c3940eb2708c298bd174cdd10de05533f1f413119dd0c1a5d6273dc50c27.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f85c3940eb2708c298bd174cdd10de05533f1f413119dd0c1a5d6273dc50c27.dll,#12⤵PID:4252
-