Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
717f86f40273f63f5bf895940e74c94d1e50128cf82eace9129bbc67edb16662.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
717f86f40273f63f5bf895940e74c94d1e50128cf82eace9129bbc67edb16662.dll
Resource
win10v2004-20220812-en
General
-
Target
717f86f40273f63f5bf895940e74c94d1e50128cf82eace9129bbc67edb16662.dll
-
Size
1.7MB
-
MD5
0a0bf37a02fc0811e91151500ee0d09b
-
SHA1
ba7aba1e01bb20aba2327c5ab28da52ee4026e5a
-
SHA256
717f86f40273f63f5bf895940e74c94d1e50128cf82eace9129bbc67edb16662
-
SHA512
a7a67d6e87babdaa892e1086242b4a041bb6908f323e0d45c5b19c1fa354e77e8068a01fd0962b84b0fe8dcdbb11eec75b7f765091e5ef1a49deb2ae6a26a8cd
-
SSDEEP
49152:oFluPthx3e8E/L4gq9P9bCSGlCPuGi2U9u/o+xP0E:AlMh31o4gq9P9OSyCPuGdUUdcE
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 1312 4888 rundll32.exe 81 PID 4888 wrote to memory of 1312 4888 rundll32.exe 81 PID 4888 wrote to memory of 1312 4888 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\717f86f40273f63f5bf895940e74c94d1e50128cf82eace9129bbc67edb16662.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\717f86f40273f63f5bf895940e74c94d1e50128cf82eace9129bbc67edb16662.dll,#12⤵PID:1312
-