Analysis
-
max time kernel
175s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
f085cb9782e06df633b7197b11dfffe1a8a1bcd3a7724486014bfc0b1558a52f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f085cb9782e06df633b7197b11dfffe1a8a1bcd3a7724486014bfc0b1558a52f.dll
Resource
win10v2004-20220812-en
General
-
Target
f085cb9782e06df633b7197b11dfffe1a8a1bcd3a7724486014bfc0b1558a52f.dll
-
Size
7KB
-
MD5
821bba53a1712a9db25bde1aa05e220a
-
SHA1
ee739b194dc8f0325ec3cf865a7dace96d88d34f
-
SHA256
f085cb9782e06df633b7197b11dfffe1a8a1bcd3a7724486014bfc0b1558a52f
-
SHA512
e06eb1a1110d1d58aa7442f9bacf1d70fd864608834075eb360091fe8f14666dca9bb7a0aa60d533cf6f44665aa0c76d042463b2d693455e8b12e17e513f4af9
-
SSDEEP
96:Ts1Wnnnynnnnnnnn6nnann7nnXnnbnnKniROrdZLdIeI9oIzjqIbZ1R+cDgTEoIv:YXwdZLm19/zjpbZ1RpgTaulUeg
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 4880 4180 rundll32.exe 79 PID 4180 wrote to memory of 4880 4180 rundll32.exe 79 PID 4180 wrote to memory of 4880 4180 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f085cb9782e06df633b7197b11dfffe1a8a1bcd3a7724486014bfc0b1558a52f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f085cb9782e06df633b7197b11dfffe1a8a1bcd3a7724486014bfc0b1558a52f.dll,#12⤵PID:4880
-