Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 17:59
Static task
static1
Behavioral task
behavioral1
Sample
238f49b78fd0338c0a7d2090738697c981b90977d7554caa1c3bd1937780db99.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
238f49b78fd0338c0a7d2090738697c981b90977d7554caa1c3bd1937780db99.dll
Resource
win10v2004-20220901-en
General
-
Target
238f49b78fd0338c0a7d2090738697c981b90977d7554caa1c3bd1937780db99.dll
-
Size
15KB
-
MD5
82c36a002908d55199a1e772331cdb42
-
SHA1
014d66e63f5cdb90e0cf5fde31c40e06d6caf14e
-
SHA256
238f49b78fd0338c0a7d2090738697c981b90977d7554caa1c3bd1937780db99
-
SHA512
f45cc1f67b0aaf05c3a953c26af4ae73c2538ab711f60952909488b53b1188fe11dc02a6f3b82797c3f13beaeb46537a42e02c552cf22623ea989980754c0c68
-
SSDEEP
192:SC0itFaWlB2SYxmJzTQsoHImVigU6d984blsckwLsBb/d6T+z9SCqGfFMKdt:SCb662ZWzh3ws1Jb/KU9SCq8FMKf
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4712 4868 rundll32.exe 67 PID 4868 wrote to memory of 4712 4868 rundll32.exe 67 PID 4868 wrote to memory of 4712 4868 rundll32.exe 67
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\238f49b78fd0338c0a7d2090738697c981b90977d7554caa1c3bd1937780db99.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\238f49b78fd0338c0a7d2090738697c981b90977d7554caa1c3bd1937780db99.dll,#12⤵PID:4712
-