Analysis
-
max time kernel
90s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
ac71a930dd4faabe84b80b872eef3cfabf8f6b27e5b074a18cd77966de080717.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac71a930dd4faabe84b80b872eef3cfabf8f6b27e5b074a18cd77966de080717.dll
Resource
win10v2004-20220901-en
General
-
Target
ac71a930dd4faabe84b80b872eef3cfabf8f6b27e5b074a18cd77966de080717.dll
-
Size
31KB
-
MD5
962904ab881bc1d0904c830511137590
-
SHA1
2ce58c9499ac60c0d8de35d5b02af73102d4cb42
-
SHA256
ac71a930dd4faabe84b80b872eef3cfabf8f6b27e5b074a18cd77966de080717
-
SHA512
ce38d4f23751f01ed4b24b282c7cf2364929968a76dcea0902777827855bcc667d1c9d6dd7aeb725da987ad4b282c1bae8987e1ee08eb81bc9ef2bb305a38c29
-
SSDEEP
192:VRRQmkmHk+NIlKa1O0xMtMNwbHEcvTKfypmNyHLgEzSms9H9CsF9Fu:VRPkGkDKWO0YJjEAtLXS79H9C0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3720 wrote to memory of 4760 3720 rundll32.exe 82 PID 3720 wrote to memory of 4760 3720 rundll32.exe 82 PID 3720 wrote to memory of 4760 3720 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac71a930dd4faabe84b80b872eef3cfabf8f6b27e5b074a18cd77966de080717.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac71a930dd4faabe84b80b872eef3cfabf8f6b27e5b074a18cd77966de080717.dll,#12⤵PID:4760
-