Analysis
-
max time kernel
90s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 12:11
Static task
static1
Behavioral task
behavioral1
Sample
7da293286d3ee048aaf224154773851b17eec22846b139b83c81ee689edb84e4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7da293286d3ee048aaf224154773851b17eec22846b139b83c81ee689edb84e4.dll
Resource
win10v2004-20220901-en
General
-
Target
7da293286d3ee048aaf224154773851b17eec22846b139b83c81ee689edb84e4.dll
-
Size
212KB
-
MD5
2333d2dee02c38f451f0b4fe2b0e5f70
-
SHA1
7068a5d0548cc1410cadae8207b53e91a515eeff
-
SHA256
7da293286d3ee048aaf224154773851b17eec22846b139b83c81ee689edb84e4
-
SHA512
ba65cf5466646a178505fe9134201cb09782e79bcfe983d2281c4c6952aa45013b349f9dd67957d1288dc47353d9a7dc2d776a0c2330f49e4f316de7da98b73c
-
SSDEEP
3072:A9Zx8ubF5fZOvJxW7MHpDLqwdQgCvlhS+0uz9+4NTZDWVrAi8WNMXr0ezn6j:A9HbF5fgvjXBqYoS+/kAi8W70
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 4792 1180 rundll32.exe 76 PID 1180 wrote to memory of 4792 1180 rundll32.exe 76 PID 1180 wrote to memory of 4792 1180 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7da293286d3ee048aaf224154773851b17eec22846b139b83c81ee689edb84e4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7da293286d3ee048aaf224154773851b17eec22846b139b83c81ee689edb84e4.dll,#12⤵PID:4792
-