Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 03:23
Static task
static1
Behavioral task
behavioral1
Sample
ad079811b79e07d9ff504ffc5f0354a1b5d19d677ddb54c7db27e2a8a4ddcf4b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad079811b79e07d9ff504ffc5f0354a1b5d19d677ddb54c7db27e2a8a4ddcf4b.dll
Resource
win10v2004-20220901-en
General
-
Target
ad079811b79e07d9ff504ffc5f0354a1b5d19d677ddb54c7db27e2a8a4ddcf4b.dll
-
Size
83KB
-
MD5
46551ee1c9f79bfec2bf17ea30430db5
-
SHA1
3bc45596f431790a9edc2357b35f35869a41e488
-
SHA256
ad079811b79e07d9ff504ffc5f0354a1b5d19d677ddb54c7db27e2a8a4ddcf4b
-
SHA512
fad28f23ec932c8e18fd5cc9dd23dfb42a7a2601c64b0c85a1a1f1635145c9ede3ea2a94701bdb0228e5a7b4f4e995f7cf782a75c294a90625f35b9501db1577
-
SSDEEP
1536:siPXgpa5bDkDOFta3RluUlM+XGSP2GMNPO+H8oUxNvFGDsfqNwApeI8gv17:tgW3y3RFluGMtNcoS2HzpF
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5076 wrote to memory of 3752 5076 rundll32.exe 82 PID 5076 wrote to memory of 3752 5076 rundll32.exe 82 PID 5076 wrote to memory of 3752 5076 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad079811b79e07d9ff504ffc5f0354a1b5d19d677ddb54c7db27e2a8a4ddcf4b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad079811b79e07d9ff504ffc5f0354a1b5d19d677ddb54c7db27e2a8a4ddcf4b.dll,#12⤵PID:3752
-