Analysis
-
max time kernel
92s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 07:41
Behavioral task
behavioral1
Sample
35f8b405682328441e9ac6801ce76a1f81f3815f1adcd12636e1071f4ee9c2aa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35f8b405682328441e9ac6801ce76a1f81f3815f1adcd12636e1071f4ee9c2aa.dll
Resource
win10v2004-20220812-en
General
-
Target
35f8b405682328441e9ac6801ce76a1f81f3815f1adcd12636e1071f4ee9c2aa.dll
-
Size
96KB
-
MD5
a322f33361cf39a61ed864ee675a2b16
-
SHA1
60267dc2d45f65550eb0b57b2320742d757bd4bc
-
SHA256
35f8b405682328441e9ac6801ce76a1f81f3815f1adcd12636e1071f4ee9c2aa
-
SHA512
dc86971971841578a84611c847fc56805d128dac8e0ab72c162410da7b6374490978e341980980c22e5ab42981d2e70e5e85a2cc126f20644d046317301cc4cb
-
SSDEEP
1536:R76tUtJXi1awacYgJOr20X8ifikvsuUDcrCvsdYT2ZQcPelxyrQmPf7neoMPh:R7XtlLcYgJOak8iKKykQs5ZQJaDnvMPh
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1264 4460 rundll32.exe 82 PID 4460 wrote to memory of 1264 4460 rundll32.exe 82 PID 4460 wrote to memory of 1264 4460 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\35f8b405682328441e9ac6801ce76a1f81f3815f1adcd12636e1071f4ee9c2aa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\35f8b405682328441e9ac6801ce76a1f81f3815f1adcd12636e1071f4ee9c2aa.dll,#12⤵PID:1264
-