Analysis
-
max time kernel
185s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2022, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
f1211840d031828c96c6b14f6a295ea3be296ef501ff4be8c7df721ad242c35a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1211840d031828c96c6b14f6a295ea3be296ef501ff4be8c7df721ad242c35a.dll
Resource
win10v2004-20220812-en
General
-
Target
f1211840d031828c96c6b14f6a295ea3be296ef501ff4be8c7df721ad242c35a.dll
-
Size
6KB
-
MD5
505a45b855ed2a98305b8d9af6e8951e
-
SHA1
573553747b3832ac362a05b43cd741be40d639c6
-
SHA256
f1211840d031828c96c6b14f6a295ea3be296ef501ff4be8c7df721ad242c35a
-
SHA512
80e99ae25d695cd1a5f3c64ac011fb80ef34f7f54fd5ea25b6c88ff279bfc2aa67456b089cb09c01f24dc6f847f2429666d858f45d7b873e8f90e413a61e86f8
-
SSDEEP
48:CfqNkYh+A9GSE8w7uCeL5l7zuUl6T0yRv5kK3KKX7iwwc9cdbcpnNYB27dc3:oWqSE97uCeFl7XrKXScKdYXYl
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4808 wrote to memory of 1984 4808 rundll32.exe 82 PID 4808 wrote to memory of 1984 4808 rundll32.exe 82 PID 4808 wrote to memory of 1984 4808 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1211840d031828c96c6b14f6a295ea3be296ef501ff4be8c7df721ad242c35a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1211840d031828c96c6b14f6a295ea3be296ef501ff4be8c7df721ad242c35a.dll,#12⤵PID:1984
-