Analysis
-
max time kernel
122s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 22:50
Behavioral task
behavioral1
Sample
346f1f008ade262276b1c1b6e17e8d6bd858ab0318aea2108175c05c8260b099.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
346f1f008ade262276b1c1b6e17e8d6bd858ab0318aea2108175c05c8260b099.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
346f1f008ade262276b1c1b6e17e8d6bd858ab0318aea2108175c05c8260b099.dll
-
Size
56KB
-
MD5
0fd24262ebf721f9e3615cf9dcd1ac23
-
SHA1
85393866c73b49eb536b0034c9984d42989a454e
-
SHA256
346f1f008ade262276b1c1b6e17e8d6bd858ab0318aea2108175c05c8260b099
-
SHA512
bffc54ccb63cb80dedfe743e2ff8e2675d1b3abc100751a370df023be9fb1a9020f7cfebbbde22fc20ff444603ab10cd5f50b693388dfe3c3fb0a408ddc5ebe1
-
SSDEEP
1536:mPO6KEVbsVP0gFhh2XBJtnmS9GBpmKYQ73V6R6VCmNx9L7rtd:cMEVbsVcehIXZnmr88iwCm5/td
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1200-133-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1200 5048 rundll32.exe 84 PID 5048 wrote to memory of 1200 5048 rundll32.exe 84 PID 5048 wrote to memory of 1200 5048 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\346f1f008ade262276b1c1b6e17e8d6bd858ab0318aea2108175c05c8260b099.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\346f1f008ade262276b1c1b6e17e8d6bd858ab0318aea2108175c05c8260b099.dll,#12⤵PID:1200
-