Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
a07220866cc080b08148736af6d012b8f19dad8b8e11b563d82a6b87a56b93d7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a07220866cc080b08148736af6d012b8f19dad8b8e11b563d82a6b87a56b93d7.dll
Resource
win10v2004-20220901-en
General
-
Target
a07220866cc080b08148736af6d012b8f19dad8b8e11b563d82a6b87a56b93d7.dll
-
Size
686KB
-
MD5
5ec5715242f5915fa64e6e3db47e4990
-
SHA1
f1b0a6e104faf2b25552bb97e2552d2fda5ce492
-
SHA256
a07220866cc080b08148736af6d012b8f19dad8b8e11b563d82a6b87a56b93d7
-
SHA512
42aa6054a9681dc135eb73846f6fd54118b434386245035c6144a044678ee44818b97ebde9f23de7f9b79c19791092461bd1b4bb8f176ef1df57cb03c5a55711
-
SSDEEP
3072:bQYvpbGxZ7703lGfB8pn2swPU+ioNFNYqYswrKOqJzv6s/tUugu:brV6ZW7l8FqKOQZUugu
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1164 2188 rundll32.exe 84 PID 2188 wrote to memory of 1164 2188 rundll32.exe 84 PID 2188 wrote to memory of 1164 2188 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a07220866cc080b08148736af6d012b8f19dad8b8e11b563d82a6b87a56b93d7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a07220866cc080b08148736af6d012b8f19dad8b8e11b563d82a6b87a56b93d7.dll,#12⤵PID:1164
-