Analysis
-
max time kernel
186s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
1118c6bdf9cc2e3493d179f6f0d4030f17c006d24dd92bababf4488774e54df2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1118c6bdf9cc2e3493d179f6f0d4030f17c006d24dd92bababf4488774e54df2.dll
Resource
win10v2004-20220812-en
General
-
Target
1118c6bdf9cc2e3493d179f6f0d4030f17c006d24dd92bababf4488774e54df2.dll
-
Size
5KB
-
MD5
0e2080e82163fa42302017dcc29c4d70
-
SHA1
e3ef408933332912b198a77314f9958f620d4bcf
-
SHA256
1118c6bdf9cc2e3493d179f6f0d4030f17c006d24dd92bababf4488774e54df2
-
SHA512
e22685578c8356e2c950de7b0dc36cbd493bc29461b10b149f0bb8dcae05a60d61b20aad735141cb6960ba6e2985c6dc0e9a457b7b98e32049a89f5bb39b1862
-
SSDEEP
48:C6VonAHso6U7lYa92RrpjwDmetlG95hx+iMHhT6OnZsxkMlvzFrDXLyzDHeFe+sr:nEY2RrF1eqwi4IOSxXiDiYIp
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4844 wrote to memory of 5032 4844 rundll32.exe 81 PID 4844 wrote to memory of 5032 4844 rundll32.exe 81 PID 4844 wrote to memory of 5032 4844 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1118c6bdf9cc2e3493d179f6f0d4030f17c006d24dd92bababf4488774e54df2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1118c6bdf9cc2e3493d179f6f0d4030f17c006d24dd92bababf4488774e54df2.dll,#12⤵PID:5032
-