Analysis
-
max time kernel
99s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
9e530208930916d3fdb5bef2361dda991c375a241f2b4b462f9ce239ebcd97f5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9e530208930916d3fdb5bef2361dda991c375a241f2b4b462f9ce239ebcd97f5.dll
Resource
win10v2004-20220812-en
General
-
Target
9e530208930916d3fdb5bef2361dda991c375a241f2b4b462f9ce239ebcd97f5.dll
-
Size
44KB
-
MD5
84ed7ee3644775b45d36bf89f3b0c9e9
-
SHA1
b98fdb88849327e302efdc7d6475b084246058fd
-
SHA256
9e530208930916d3fdb5bef2361dda991c375a241f2b4b462f9ce239ebcd97f5
-
SHA512
71c3a8181e06234d26b7a1cc768d28c3416a1d266dcf3490c45797280c88feafa681cab24f727e2b99346df4eecef824d185c463f81b98a14af5ea83c6887677
-
SSDEEP
384:D2y6K867Tn9i6+Xiyo07PEWUJOoH8HoI0I/YDLtuSAPcWPnofgULnYHKb:o967Tn91+SjXQoHy7YDLtiPno2y
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4348 rundll32.exe 4348 rundll32.exe 4348 rundll32.exe 4348 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4372 wrote to memory of 4348 4372 rundll32.exe 79 PID 4372 wrote to memory of 4348 4372 rundll32.exe 79 PID 4372 wrote to memory of 4348 4372 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e530208930916d3fdb5bef2361dda991c375a241f2b4b462f9ce239ebcd97f5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e530208930916d3fdb5bef2361dda991c375a241f2b4b462f9ce239ebcd97f5.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348
-