Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 07:52
Behavioral task
behavioral1
Sample
945714ebd2ee4307a96af1d67b7757ef99a5d5bf302c2cd8b9892962d4c1dca5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
945714ebd2ee4307a96af1d67b7757ef99a5d5bf302c2cd8b9892962d4c1dca5.dll
Resource
win10v2004-20220812-en
General
-
Target
945714ebd2ee4307a96af1d67b7757ef99a5d5bf302c2cd8b9892962d4c1dca5.dll
-
Size
27KB
-
MD5
85072840c38dee2ddd7437f957b16b93
-
SHA1
bef33e433d323beccddba7b17ff2f16e96be5b04
-
SHA256
945714ebd2ee4307a96af1d67b7757ef99a5d5bf302c2cd8b9892962d4c1dca5
-
SHA512
6abecfecdd245436a5d2f9cba66d962dfe88bccd889ec1ea1a1b2f341ddd362ed80fb690363075c3b9d41f3b6369df4b234cf1078403b8ff6ac494d0c8587828
-
SSDEEP
384:xat5MeANKtNMYzH2A59Q3kcYPXnzZOBTzSqc+y5hMXpX6Qa/htBD9wspHowFS/19:ct5M90tDWFHYPXYzSNJhMMhBHoldbJj
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2696 wrote to memory of 3952 2696 rundll32.exe 83 PID 2696 wrote to memory of 3952 2696 rundll32.exe 83 PID 2696 wrote to memory of 3952 2696 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\945714ebd2ee4307a96af1d67b7757ef99a5d5bf302c2cd8b9892962d4c1dca5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\945714ebd2ee4307a96af1d67b7757ef99a5d5bf302c2cd8b9892962d4c1dca5.dll,#12⤵PID:3952
-