Analysis
-
max time kernel
91s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
ce31434aa2806be137024ce3166ab66fe5546cb0fd1f8c9ccb8a22cc693edc43.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce31434aa2806be137024ce3166ab66fe5546cb0fd1f8c9ccb8a22cc693edc43.dll
Resource
win10v2004-20220901-en
General
-
Target
ce31434aa2806be137024ce3166ab66fe5546cb0fd1f8c9ccb8a22cc693edc43.dll
-
Size
687KB
-
MD5
a3b691538cf158675bd091f4924c4860
-
SHA1
71e99cb71af6a75ba0fd703173f9b7741b1aafd5
-
SHA256
ce31434aa2806be137024ce3166ab66fe5546cb0fd1f8c9ccb8a22cc693edc43
-
SHA512
9ad3b0cca68c0fff161848812f4b6405ffbc5163569dc12db92c9f08363a08effbcbdf20959aa6c086f672c3621a4911689272894f3f245d06084431d366f619
-
SSDEEP
3072:wyAb2K/wKbwa3ffR8aziy+T2zNlUJq1fUfEj+2fdLfoC9YXhhbAPsm68K1u2mxID:wyjJKBfHTH7PKWx6Tx7mxC
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1392 5048 rundll32.exe 81 PID 5048 wrote to memory of 1392 5048 rundll32.exe 81 PID 5048 wrote to memory of 1392 5048 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce31434aa2806be137024ce3166ab66fe5546cb0fd1f8c9ccb8a22cc693edc43.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce31434aa2806be137024ce3166ab66fe5546cb0fd1f8c9ccb8a22cc693edc43.dll,#12⤵PID:1392
-