Analysis
-
max time kernel
92s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
1803910a6ccc9e4ed38ab456b264eabcecae54396194e4b5eb74ae07e11b65a8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1803910a6ccc9e4ed38ab456b264eabcecae54396194e4b5eb74ae07e11b65a8.dll
Resource
win10v2004-20220812-en
General
-
Target
1803910a6ccc9e4ed38ab456b264eabcecae54396194e4b5eb74ae07e11b65a8.dll
-
Size
5KB
-
MD5
0427b094e7d99ef6aa6f33b1c4dc8f84
-
SHA1
9f6a5e37e80a0cc25bb7158a0a13728bcecadb43
-
SHA256
1803910a6ccc9e4ed38ab456b264eabcecae54396194e4b5eb74ae07e11b65a8
-
SHA512
a928ded8aced76d85d0095880b3bd45f636ea6802316f8264b4f5dd3c39825d2f0a119864efc6a22eed8c2098586e50245a8afc677918c175ab34fa29d79e927
-
SSDEEP
48:a5zdM1cSTBg0r27vTuAEK++2J0AVk2dExiBOzxYbPz7MSuC/IlO:PT3r2vu9R+hidEY4FCXfys
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4064 4364 rundll32.exe 79 PID 4364 wrote to memory of 4064 4364 rundll32.exe 79 PID 4364 wrote to memory of 4064 4364 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1803910a6ccc9e4ed38ab456b264eabcecae54396194e4b5eb74ae07e11b65a8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1803910a6ccc9e4ed38ab456b264eabcecae54396194e4b5eb74ae07e11b65a8.dll,#12⤵PID:4064
-