Analysis
-
max time kernel
91s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 18:37
Static task
static1
Behavioral task
behavioral1
Sample
b8d8d64a29b0b049e61313ffd86d70d1c1c37aaa2e166c85251bcfd0d69726b2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8d8d64a29b0b049e61313ffd86d70d1c1c37aaa2e166c85251bcfd0d69726b2.dll
Resource
win10v2004-20220901-en
General
-
Target
b8d8d64a29b0b049e61313ffd86d70d1c1c37aaa2e166c85251bcfd0d69726b2.dll
-
Size
106KB
-
MD5
81e19f86af0326888088671fbd48a52e
-
SHA1
5fa3a262548ad3efea0480aaa0df2dfb830102c8
-
SHA256
b8d8d64a29b0b049e61313ffd86d70d1c1c37aaa2e166c85251bcfd0d69726b2
-
SHA512
2dc0cbf53c6aaaf58967387a8eef53a5cf85367fbc6c17ce281adf4b91ea43c3dbacbdd030b794445d70843911d79c6140cabfc8f508b6ddd6c885aec473331d
-
SSDEEP
1536:jt+xVKz+tjjibQRmNWYjA0tdVTT52ElUCl8iw7DVE5bat/U:jCwz+tnHYZ0AdDVwHm5bOs
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4960 5064 rundll32.exe 81 PID 5064 wrote to memory of 4960 5064 rundll32.exe 81 PID 5064 wrote to memory of 4960 5064 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b8d8d64a29b0b049e61313ffd86d70d1c1c37aaa2e166c85251bcfd0d69726b2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b8d8d64a29b0b049e61313ffd86d70d1c1c37aaa2e166c85251bcfd0d69726b2.dll,#12⤵PID:4960
-