Analysis
-
max time kernel
99s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 03:27
Static task
static1
Behavioral task
behavioral1
Sample
5c82f8c55c4c0bf5beda98b86b6bb1884c9abb056134aa97b9955adf242ccf22.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5c82f8c55c4c0bf5beda98b86b6bb1884c9abb056134aa97b9955adf242ccf22.dll
Resource
win10v2004-20220812-en
General
-
Target
5c82f8c55c4c0bf5beda98b86b6bb1884c9abb056134aa97b9955adf242ccf22.dll
-
Size
701KB
-
MD5
42625ad537e1f744161cd7e78cb9c524
-
SHA1
5a3b3813d372bfba47bcff15551a2f159d504bb2
-
SHA256
5c82f8c55c4c0bf5beda98b86b6bb1884c9abb056134aa97b9955adf242ccf22
-
SHA512
6b3dca59264a4be21b82790aeb051f9d350137fbc9b6d6e99e489491a9d7751399479d8c4e198f13ab316e4aad6ccfc3e493c6c45c31bb5ccd2f6fd9fc647790
-
SSDEEP
12288:no7YNQ71F85ZwKd89BcF/aYP3TqOynSr3/35elqTo+ycF0IcPpcenS9:owQhyEvO5vTqXnQ3v0lqBqIcPpRS9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2880 5048 rundll32.exe 78 PID 5048 wrote to memory of 2880 5048 rundll32.exe 78 PID 5048 wrote to memory of 2880 5048 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c82f8c55c4c0bf5beda98b86b6bb1884c9abb056134aa97b9955adf242ccf22.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c82f8c55c4c0bf5beda98b86b6bb1884c9abb056134aa97b9955adf242ccf22.dll,#12⤵PID:2880
-