Analysis
-
max time kernel
151s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 14:15
Static task
static1
Behavioral task
behavioral1
Sample
ae6227ca7bd3a44c03c93b53fd714f861796bdc74e76546cbe5b24b49a2cf6c4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ae6227ca7bd3a44c03c93b53fd714f861796bdc74e76546cbe5b24b49a2cf6c4.dll
Resource
win10v2004-20220812-en
General
-
Target
ae6227ca7bd3a44c03c93b53fd714f861796bdc74e76546cbe5b24b49a2cf6c4.dll
-
Size
687KB
-
MD5
83403bf69a951eeb97db263f06b5af30
-
SHA1
f5a90f5356c0896fde9fae564da38201bc86d2a3
-
SHA256
ae6227ca7bd3a44c03c93b53fd714f861796bdc74e76546cbe5b24b49a2cf6c4
-
SHA512
d5e3c488c8dd86a8a0e21e6bfc64cbb2365242c0a8bec84aab52400cdc63d120f504eb71eed67dd707dc49f554b2e9b29aab3cf7991054bb5caacf9c130e2d50
-
SSDEEP
3072:Fkn30AdL6IaHKP4qrEwT+0RNNLgFF5yAXl5Y18bFyL:FQdL73A+Tt8Gyl5Y1MyL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4176 4900 rundll32.exe 82 PID 4900 wrote to memory of 4176 4900 rundll32.exe 82 PID 4900 wrote to memory of 4176 4900 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae6227ca7bd3a44c03c93b53fd714f861796bdc74e76546cbe5b24b49a2cf6c4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae6227ca7bd3a44c03c93b53fd714f861796bdc74e76546cbe5b24b49a2cf6c4.dll,#12⤵PID:4176
-