Analysis
-
max time kernel
149s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
5acdd40abeb469893053c9fcedbda6721cabe1c7f761da74019bcf6fb80d3f53.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5acdd40abeb469893053c9fcedbda6721cabe1c7f761da74019bcf6fb80d3f53.dll
Resource
win10v2004-20220812-en
General
-
Target
5acdd40abeb469893053c9fcedbda6721cabe1c7f761da74019bcf6fb80d3f53.dll
-
Size
89KB
-
MD5
a3594ea52dce5fa589e5334e13efee33
-
SHA1
2eacc1442bb9b8f5da574b333c1d9c7c07af57ba
-
SHA256
5acdd40abeb469893053c9fcedbda6721cabe1c7f761da74019bcf6fb80d3f53
-
SHA512
7c3a04a75d6cf781f8020ad272349c86e7266349a6ef5fba50b9cbcd4ea14d8638f95ff0c98b22ead158a9bb3e756c2242dccd6762c3f3606fce2f64eb2df3bb
-
SSDEEP
1536:F5botxiZ+6QuyWK5RJE6pbWgaE/GSwIdWwgoUD4vA7jnmDwRfojeoOoZW0y:3bojiw6wi6pbvulIPIDWA7jneHjeoOo/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4684 4708 rundll32.exe 81 PID 4708 wrote to memory of 4684 4708 rundll32.exe 81 PID 4708 wrote to memory of 4684 4708 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5acdd40abeb469893053c9fcedbda6721cabe1c7f761da74019bcf6fb80d3f53.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5acdd40abeb469893053c9fcedbda6721cabe1c7f761da74019bcf6fb80d3f53.dll,#12⤵PID:4684
-