Analysis
-
max time kernel
215s -
max time network
231s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
806fa654075218755ddff5fc6a74dbd12c0f794baa3341ba90b6d71f0f4c841b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
806fa654075218755ddff5fc6a74dbd12c0f794baa3341ba90b6d71f0f4c841b.dll
Resource
win10v2004-20220812-en
General
-
Target
806fa654075218755ddff5fc6a74dbd12c0f794baa3341ba90b6d71f0f4c841b.dll
-
Size
161KB
-
MD5
0a8f22396e4176756c7064e21694da9c
-
SHA1
88cd4f648a88884d67596d69c2aa8e91d832c2b7
-
SHA256
806fa654075218755ddff5fc6a74dbd12c0f794baa3341ba90b6d71f0f4c841b
-
SHA512
5cd8a951c5cb4c896e78ef72e37cc38a77745947f28ce0d6895ade77f1e6dd9fae9cfb50ef9f198f39182e53f0264653a2dbf2d683e7ccecd9a588324b4175e4
-
SSDEEP
3072:0GQCkNhhdM3fc4IyM/+YXhs2iut/EqQBsOmMWK9IHku:3QCkNhhdMXIp/+es2iu1hQBdgogku
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 2844 4364 rundll32.exe 81 PID 4364 wrote to memory of 2844 4364 rundll32.exe 81 PID 4364 wrote to memory of 2844 4364 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\806fa654075218755ddff5fc6a74dbd12c0f794baa3341ba90b6d71f0f4c841b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\806fa654075218755ddff5fc6a74dbd12c0f794baa3341ba90b6d71f0f4c841b.dll,#12⤵PID:2844
-