Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 04:25
Behavioral task
behavioral1
Sample
0c8483a34f9856917fabbde075d88f0a4573538e4e47d03d9c325593928e3b0b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0c8483a34f9856917fabbde075d88f0a4573538e4e47d03d9c325593928e3b0b.dll
Resource
win10v2004-20220901-en
General
-
Target
0c8483a34f9856917fabbde075d88f0a4573538e4e47d03d9c325593928e3b0b.dll
-
Size
64KB
-
MD5
65b1ea28f7e87a5610164958d30d2283
-
SHA1
6260f5a6554df15e3c065b398d55cd27a94ec01d
-
SHA256
0c8483a34f9856917fabbde075d88f0a4573538e4e47d03d9c325593928e3b0b
-
SHA512
05674c7f3fdd9ca598010263a8bd5725853fae07b8c913a76d02b7d9ffbf5aa2787492c54b2e004796ee75e396b45a1a9a5b34128b817e873aff61673c6c0ccd
-
SSDEEP
768:nbY4lbSuhK2fz7bBMMwQRR13fp2Qzv9Tx20PoutX1jldHYEdfRZb8oT5ZrNdlLq:EGb1fz7bWzQF3B2g1o0RhHDZb5Zvu
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1388 wrote to memory of 3816 1388 rundll32.exe 81 PID 1388 wrote to memory of 3816 1388 rundll32.exe 81 PID 1388 wrote to memory of 3816 1388 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c8483a34f9856917fabbde075d88f0a4573538e4e47d03d9c325593928e3b0b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c8483a34f9856917fabbde075d88f0a4573538e4e47d03d9c325593928e3b0b.dll,#12⤵PID:3816
-