Analysis
-
max time kernel
127s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
a130e421a74e7414db078025ba8c86915035d518886ef58ef3debd965f60d192.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a130e421a74e7414db078025ba8c86915035d518886ef58ef3debd965f60d192.dll
Resource
win10v2004-20220901-en
General
-
Target
a130e421a74e7414db078025ba8c86915035d518886ef58ef3debd965f60d192.dll
-
Size
248KB
-
MD5
8056e81993feed74a35ae9977d36d248
-
SHA1
aa009a67b0f6a734144a52145d9e680ba914ded9
-
SHA256
a130e421a74e7414db078025ba8c86915035d518886ef58ef3debd965f60d192
-
SHA512
976483c3519bd30a5d7ad4c4a151d86c95c6b3886c1bf88f595a8b38652a9fd86778fb5859ccfc2a2e520fb9c2cdf480c6fadda04aa5f620b70234c23ffca2de
-
SSDEEP
6144:drmI3zj8cp1JT3uYNOOMtsFZvMfKXCKo0aCqpYN6QhCC:K6vG+o1Cq+6QYC
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 3120 1664 rundll32.exe 82 PID 1664 wrote to memory of 3120 1664 rundll32.exe 82 PID 1664 wrote to memory of 3120 1664 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a130e421a74e7414db078025ba8c86915035d518886ef58ef3debd965f60d192.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a130e421a74e7414db078025ba8c86915035d518886ef58ef3debd965f60d192.dll,#12⤵PID:3120
-