Analysis
-
max time kernel
72s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 07:34
Static task
static1
Behavioral task
behavioral1
Sample
bf5c0c2f1c19c10196e1fc45bb5fcf68d2189e92cce22857caa664e8e43bc5ef.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf5c0c2f1c19c10196e1fc45bb5fcf68d2189e92cce22857caa664e8e43bc5ef.dll
Resource
win10v2004-20220812-en
General
-
Target
bf5c0c2f1c19c10196e1fc45bb5fcf68d2189e92cce22857caa664e8e43bc5ef.dll
-
Size
9KB
-
MD5
1a132e3dcaa210dbf4bf3611ce7950a0
-
SHA1
fe84c517730d5d0280e1d8a27df24905fb5ec1c5
-
SHA256
bf5c0c2f1c19c10196e1fc45bb5fcf68d2189e92cce22857caa664e8e43bc5ef
-
SHA512
63f2473e8a521ca8143a6b5e19d279cca2732c07ef425ee6e8c357d1a85b6131af64bbb36b61c0810ad525676c9c0566146073d6f9442e82d50f2e4f1967abe9
-
SSDEEP
96:HFBncuLtWENepYQ/LeJdqF2JExa+vQqg9wW0hb8kt3AkFpN5FEblw4eoI:lquoL/L0XKQUQwzb2MpXyK4
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3444 wrote to memory of 2360 3444 rundll32.exe 79 PID 3444 wrote to memory of 2360 3444 rundll32.exe 79 PID 3444 wrote to memory of 2360 3444 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf5c0c2f1c19c10196e1fc45bb5fcf68d2189e92cce22857caa664e8e43bc5ef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf5c0c2f1c19c10196e1fc45bb5fcf68d2189e92cce22857caa664e8e43bc5ef.dll,#12⤵PID:2360
-