Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
a8f7fae83e2200f846f941fefe1d242867631cb68115d949514ab3fd4d9433a3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8f7fae83e2200f846f941fefe1d242867631cb68115d949514ab3fd4d9433a3.dll
Resource
win10v2004-20220812-en
General
-
Target
a8f7fae83e2200f846f941fefe1d242867631cb68115d949514ab3fd4d9433a3.dll
-
Size
59KB
-
MD5
9241a36d01ea09d8610ab518452d6000
-
SHA1
1ee41965e59597f2e6d59e4f6c6c7782bd3163fa
-
SHA256
a8f7fae83e2200f846f941fefe1d242867631cb68115d949514ab3fd4d9433a3
-
SHA512
ba964ee33ea7821e4476efdc4b96692d4022c38ce2a786faf58eafe0d4ef58d9e4766b7b540411e15d6a0b23994bd76c2c41a0f2088a7b59d868dcbe2298374c
-
SSDEEP
768:Vv+Rq91szC3mzsvwKQxy1WXNXIVImYNcTNR6OY83TCHiPaFrsGMCqQXs7dFy1:sRq91sehL1WXqr6OY8XsrsGJMFW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4932 4068 rundll32.exe 82 PID 4068 wrote to memory of 4932 4068 rundll32.exe 82 PID 4068 wrote to memory of 4932 4068 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a8f7fae83e2200f846f941fefe1d242867631cb68115d949514ab3fd4d9433a3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a8f7fae83e2200f846f941fefe1d242867631cb68115d949514ab3fd4d9433a3.dll,#12⤵PID:4932
-