Analysis
-
max time kernel
112s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 06:29
Behavioral task
behavioral1
Sample
6de65e614fa2864f27c01ab0d1b0a2841394788b8dbc4f43406bd9bf6813a2ca.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6de65e614fa2864f27c01ab0d1b0a2841394788b8dbc4f43406bd9bf6813a2ca.dll
Resource
win10v2004-20220901-en
General
-
Target
6de65e614fa2864f27c01ab0d1b0a2841394788b8dbc4f43406bd9bf6813a2ca.dll
-
Size
57KB
-
MD5
8152624ecaa1f7f3fa19ebcbf471c81f
-
SHA1
251e0338fae5bd4c4041b9f79528e450d1089f12
-
SHA256
6de65e614fa2864f27c01ab0d1b0a2841394788b8dbc4f43406bd9bf6813a2ca
-
SHA512
42921354a2a2d01cfcd1a6b529b29b85b2d941e607f5c27e835448c9684234ae81c13894092cd4d4d6c81a409b861970eee7dd3424a40c28ac374ad5c60c1b3b
-
SSDEEP
768:DVV27Pk2b+S9zwj3gVswQ1gPI2BbEVp5AtXb/Uhj5yjriwxtCYMCBVa6jfPosz6L:DVV1HTSzgHp5cX7frfMQVf7vMrIOh
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1428 1664 rundll32.exe 82 PID 1664 wrote to memory of 1428 1664 rundll32.exe 82 PID 1664 wrote to memory of 1428 1664 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6de65e614fa2864f27c01ab0d1b0a2841394788b8dbc4f43406bd9bf6813a2ca.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6de65e614fa2864f27c01ab0d1b0a2841394788b8dbc4f43406bd9bf6813a2ca.dll,#12⤵PID:1428
-