Analysis
-
max time kernel
166s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 08:15
Static task
static1
Behavioral task
behavioral1
Sample
87ce3184db667dc753a468b55cb74a118cfe733ee2ab9758c802c0e7bd8149bc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
87ce3184db667dc753a468b55cb74a118cfe733ee2ab9758c802c0e7bd8149bc.dll
Resource
win10v2004-20220812-en
General
-
Target
87ce3184db667dc753a468b55cb74a118cfe733ee2ab9758c802c0e7bd8149bc.dll
-
Size
1.4MB
-
MD5
09694072364aec3d465e6b29e9badc4f
-
SHA1
5c39ad06b7b6fe6b6c0000e1bd848b67f4e7daf1
-
SHA256
87ce3184db667dc753a468b55cb74a118cfe733ee2ab9758c802c0e7bd8149bc
-
SHA512
dcf65774f68b1292a8d7efa3eb26e8d38efe9d2c31107e8692822586369b1a3d8a898ec0e8971ba64a06cfbc1d78a35fc116c063159ef6c28c8c72494a31814d
-
SSDEEP
24576:FP3fNGjItAGVK53ud9r9ub9YNhbfsn7wcQ7LjTfjTC89/F8l43q:xnaGVEudzuyNhbfs8cqjjn2
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4848 wrote to memory of 4932 4848 rundll32.exe 79 PID 4848 wrote to memory of 4932 4848 rundll32.exe 79 PID 4848 wrote to memory of 4932 4848 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87ce3184db667dc753a468b55cb74a118cfe733ee2ab9758c802c0e7bd8149bc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87ce3184db667dc753a468b55cb74a118cfe733ee2ab9758c802c0e7bd8149bc.dll,#12⤵PID:4932
-