Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
1f593fcfdf514ba99e8bc26ac581c1c53162311e9b9c6f056b14b9d9168f329f.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1f593fcfdf514ba99e8bc26ac581c1c53162311e9b9c6f056b14b9d9168f329f.dll
Resource
win10v2004-20220901-en
General
-
Target
1f593fcfdf514ba99e8bc26ac581c1c53162311e9b9c6f056b14b9d9168f329f.dll
-
Size
4KB
-
MD5
a0bf2f83b3386990b7823d9e51c2f02a
-
SHA1
00fdf22b6aee2a7ac439591b5abe7897b8e6ec62
-
SHA256
1f593fcfdf514ba99e8bc26ac581c1c53162311e9b9c6f056b14b9d9168f329f
-
SHA512
7f25b111ddc56822ab7feae7ce72e35297777b7bfe3813a06ccab15bb4faa521e77dd48bd9c8b1d90828180f2b4cc483babc5948a59c32d5dbc2c0ba5e8a7de0
-
SSDEEP
48:a5zjMTGcITBVQVE1lcRWRTYtqLss3Z4ePVhYUaM33I/a:iT3Qu8UTYUJ3qMhYUhv
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4980 wrote to memory of 4884 4980 rundll32.exe 70 PID 4980 wrote to memory of 4884 4980 rundll32.exe 70 PID 4980 wrote to memory of 4884 4980 rundll32.exe 70
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f593fcfdf514ba99e8bc26ac581c1c53162311e9b9c6f056b14b9d9168f329f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f593fcfdf514ba99e8bc26ac581c1c53162311e9b9c6f056b14b9d9168f329f.dll,#12⤵PID:4884
-