Analysis
-
max time kernel
148s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 04:31
Static task
static1
Behavioral task
behavioral1
Sample
4639d9b925adf398a537da9261d4c8b8cba7f33f602a1ad82e980228d9c9631b.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
General
-
Target
4639d9b925adf398a537da9261d4c8b8cba7f33f602a1ad82e980228d9c9631b.dll
-
Size
393KB
-
MD5
07a2c9a683ca500bd868c3273093e080
-
SHA1
6d1a60142882336d3db70561d4cd23a139dce416
-
SHA256
4639d9b925adf398a537da9261d4c8b8cba7f33f602a1ad82e980228d9c9631b
-
SHA512
3c89c3747134518203da4a7961b5ea1d0d959cee914abc9d37f59dd2ad1e8642f0811d7d7ce2816b5f95c914d39b990eb1425f5563c07d909d1924b4d0eca881
-
SSDEEP
3072:o6pU5Y1DXnbMn7Uzkop61/dAzV2O3XwTBftrm2YedGf3QKZD3:o6C5AXbMn7UI1FoV2gwTBlrIckPp
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3748 wrote to memory of 4892 3748 rundll32.exe 79 PID 3748 wrote to memory of 4892 3748 rundll32.exe 79 PID 3748 wrote to memory of 4892 3748 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4639d9b925adf398a537da9261d4c8b8cba7f33f602a1ad82e980228d9c9631b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4639d9b925adf398a537da9261d4c8b8cba7f33f602a1ad82e980228d9c9631b.dll,#12⤵PID:4892
-