Analysis
-
max time kernel
32s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2022 05:30
Static task
static1
Behavioral task
behavioral1
Sample
fef3c0f350e173d391422ea70aff19ba6d969286e9162e6a29e9eb293e908718.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
fef3c0f350e173d391422ea70aff19ba6d969286e9162e6a29e9eb293e908718.dll
-
Size
1.8MB
-
MD5
54d99fb64d17a2299b9486e1af1e9bb8
-
SHA1
ca1a76c2a7a778c5bdbd05d3feb76400e2d27990
-
SHA256
fef3c0f350e173d391422ea70aff19ba6d969286e9162e6a29e9eb293e908718
-
SHA512
5c1bee930ce14c18cf06fb086a62185e50327c2e39eabceab17b6372b62a0428258109b2ee8c1ef65b442933400d8f37b23f08e265b67297f27d3d81a5307f92
-
SSDEEP
49152:F7hwGWVLxLj/az2oC/ndfWztB0F3kxOJp:F7hexdCzOVQfLOJp
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2064 wrote to memory of 832 2064 rundll32.exe 76 PID 2064 wrote to memory of 832 2064 rundll32.exe 76 PID 2064 wrote to memory of 832 2064 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fef3c0f350e173d391422ea70aff19ba6d969286e9162e6a29e9eb293e908718.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fef3c0f350e173d391422ea70aff19ba6d969286e9162e6a29e9eb293e908718.dll,#12⤵PID:832
-