Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 06:28
Behavioral task
behavioral1
Sample
602a686a5c6cf01f800af5ea3d922b3da58e410ce78683657bb54cb6f119ca09.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
602a686a5c6cf01f800af5ea3d922b3da58e410ce78683657bb54cb6f119ca09.dll
Resource
win10v2004-20220901-en
General
-
Target
602a686a5c6cf01f800af5ea3d922b3da58e410ce78683657bb54cb6f119ca09.dll
-
Size
74KB
-
MD5
7739c1a8af528e079f4097e6573b1a16
-
SHA1
8050598baf186e98e595840ef4d1d2e5e1d72d93
-
SHA256
602a686a5c6cf01f800af5ea3d922b3da58e410ce78683657bb54cb6f119ca09
-
SHA512
52803e74825008ddd936b057010937dff796f8e7b8b62da299363c44d1fde09a170270ee8e974a865fd20400a8dd201eb44e4479d506868abf8781330467bc0b
-
SSDEEP
768:yuUr3ip/IHI7NQTvw+EYw/Z9kN2u38ZxT9EEV4JaSGUcT+1XBa+KsF2CtvoaA+p3:yl3E0TUngNV8V4AxT+1X5KsF2OUM90rc
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1400 2288 rundll32.exe 84 PID 2288 wrote to memory of 1400 2288 rundll32.exe 84 PID 2288 wrote to memory of 1400 2288 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\602a686a5c6cf01f800af5ea3d922b3da58e410ce78683657bb54cb6f119ca09.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\602a686a5c6cf01f800af5ea3d922b3da58e410ce78683657bb54cb6f119ca09.dll,#12⤵PID:1400
-