Analysis
-
max time kernel
112s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
9d2810b9125fa543281861142da088357baa5e0c553277540baa4831487ae481.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d2810b9125fa543281861142da088357baa5e0c553277540baa4831487ae481.dll
Resource
win10v2004-20220901-en
General
-
Target
9d2810b9125fa543281861142da088357baa5e0c553277540baa4831487ae481.dll
-
Size
164KB
-
MD5
07e6ebe691d6e85ad0ac13e19b172571
-
SHA1
43727f63b026224939ca26220c91262bebe8239c
-
SHA256
9d2810b9125fa543281861142da088357baa5e0c553277540baa4831487ae481
-
SHA512
55b585c4687899147b67ce41ca3012e8a124906ebb844ad560f1979d81cead827d1abded9bdaaa36245c756138a05cddf9b506951d63719931e3494886ee586c
-
SSDEEP
3072:skHNwyLv/ENXtvIaGqPu6xo3MoFuM7hJpDjxOv9n:skH28PaNuDM3M7h7DjxO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4972 4868 rundll32.exe 81 PID 4868 wrote to memory of 4972 4868 rundll32.exe 81 PID 4868 wrote to memory of 4972 4868 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9d2810b9125fa543281861142da088357baa5e0c553277540baa4831487ae481.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9d2810b9125fa543281861142da088357baa5e0c553277540baa4831487ae481.dll,#12⤵PID:4972
-