Analysis
-
max time kernel
93s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 22:28
Static task
static1
Behavioral task
behavioral1
Sample
72d01d77e0231a4bf13792fe6cb9453e0054f6c3bb9ec5320f29b3725a8286fd.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
72d01d77e0231a4bf13792fe6cb9453e0054f6c3bb9ec5320f29b3725a8286fd.dll
Resource
win10v2004-20220812-en
General
-
Target
72d01d77e0231a4bf13792fe6cb9453e0054f6c3bb9ec5320f29b3725a8286fd.dll
-
Size
689KB
-
MD5
0bd3a9813241b82ea31cb1b38ec7a930
-
SHA1
c87797bca01be63a1747ee243c562ebe027a1656
-
SHA256
72d01d77e0231a4bf13792fe6cb9453e0054f6c3bb9ec5320f29b3725a8286fd
-
SHA512
5aeae76423e266b092e4927e959476f0e50f104364427768e89915b3043727c6ac232f027ad40054bc7cc116f2ca3732bd5045f6759eac41f5f068190088f89d
-
SSDEEP
3072:/vtJtLSrBVE09ArbxpKDF3+bHvNV+ZkIOvrfDL1BsISiMsySvz:XNLS9Vcrby6qSIAbRS/syu
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4372 wrote to memory of 3748 4372 rundll32.exe 16 PID 4372 wrote to memory of 3748 4372 rundll32.exe 16 PID 4372 wrote to memory of 3748 4372 rundll32.exe 16
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72d01d77e0231a4bf13792fe6cb9453e0054f6c3bb9ec5320f29b3725a8286fd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72d01d77e0231a4bf13792fe6cb9453e0054f6c3bb9ec5320f29b3725a8286fd.dll,#12⤵PID:3748
-