Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 17:55
Behavioral task
behavioral1
Sample
cbce27f0786fdb020ac230dfb1520b8abc357ea983bd4e8320ea994cd2be82e1.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cbce27f0786fdb020ac230dfb1520b8abc357ea983bd4e8320ea994cd2be82e1.dll
Resource
win10v2004-20220901-en
General
-
Target
cbce27f0786fdb020ac230dfb1520b8abc357ea983bd4e8320ea994cd2be82e1.dll
-
Size
68KB
-
MD5
a3826431d3e72f6e745bf0aa193488e0
-
SHA1
ce453745656b509b3668b3ed724d73417dbd7182
-
SHA256
cbce27f0786fdb020ac230dfb1520b8abc357ea983bd4e8320ea994cd2be82e1
-
SHA512
11f16283eef4db5ef0d7ef6d4cb0216991fe6b12b246721e311e8dbf631ec694e27c82ede856046e3f2e01278def775cb058a8d4f2e02e6693d04629348ac819
-
SSDEEP
1536:XHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtA6Dw/8AR3/f2ETSZj:XHoLde/OgV432UcP39hXJZnlc/9tf2E0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2060 wrote to memory of 3908 2060 rundll32.exe 74 PID 2060 wrote to memory of 3908 2060 rundll32.exe 74 PID 2060 wrote to memory of 3908 2060 rundll32.exe 74
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbce27f0786fdb020ac230dfb1520b8abc357ea983bd4e8320ea994cd2be82e1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbce27f0786fdb020ac230dfb1520b8abc357ea983bd4e8320ea994cd2be82e1.dll,#12⤵PID:3908
-