Analysis
-
max time kernel
91s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
6e5a4c789cbdab3f6cc6e666b365810aa7415dd8d155ead3c1e1e0f8e94edac5.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6e5a4c789cbdab3f6cc6e666b365810aa7415dd8d155ead3c1e1e0f8e94edac5.dll
Resource
win10v2004-20220901-en
General
-
Target
6e5a4c789cbdab3f6cc6e666b365810aa7415dd8d155ead3c1e1e0f8e94edac5.dll
-
Size
64KB
-
MD5
15d8d39ff83abd47fc0c1e137fb6ad90
-
SHA1
898a6c5eca70453b9ac0f39c5d59f81c09a5fea1
-
SHA256
6e5a4c789cbdab3f6cc6e666b365810aa7415dd8d155ead3c1e1e0f8e94edac5
-
SHA512
bedc0534ef70bb7390617040a01b7752022a5eef521fa7e4701748513de0896987ff370cb7192562e19a6c5edee9b05ac9fb930e7607d7c076a675acd0d36971
-
SSDEEP
768:oYHLEjXqOcy48wA+LkoqW8lyTxkw9U2p26wbzC5sdxMjiB9UQgwWHiGOs3q6:XWaC+Ltq1lyTCM8nzN4los66
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4624 3080 rundll32.exe 77 PID 3080 wrote to memory of 4624 3080 rundll32.exe 77 PID 3080 wrote to memory of 4624 3080 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e5a4c789cbdab3f6cc6e666b365810aa7415dd8d155ead3c1e1e0f8e94edac5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e5a4c789cbdab3f6cc6e666b365810aa7415dd8d155ead3c1e1e0f8e94edac5.dll,#12⤵PID:4624
-