Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 04:02
Static task
static1
Behavioral task
behavioral1
Sample
6e14fb17c9d237657ed9c06f75b2ab145ec086d8cf6ac7da525313f40ad3a49e.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6e14fb17c9d237657ed9c06f75b2ab145ec086d8cf6ac7da525313f40ad3a49e.dll
Resource
win10v2004-20220812-en
General
-
Target
6e14fb17c9d237657ed9c06f75b2ab145ec086d8cf6ac7da525313f40ad3a49e.dll
-
Size
6KB
-
MD5
04ffd309b7c8d8610df9dc847cab1cd0
-
SHA1
e7976943c1dd6e0285444f817a8ff1377138e525
-
SHA256
6e14fb17c9d237657ed9c06f75b2ab145ec086d8cf6ac7da525313f40ad3a49e
-
SHA512
71717ba72c3582bbf19ed491100c51baecd9b0987146d19554f4a1e057dd888cadf75c92a411eb2a7a85b44325e5a8901887740a0c61d6fddd4e68a25cae05e9
-
SSDEEP
96:z0WgPtJrYHVjGwd+SPgOMxS0RKgc5vnVm2njq53KjZqCXaYzP7:SoiS+OMsW5c5vnQ2njqpKjZqCKYzP7
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4584 wrote to memory of 4980 4584 rundll32.exe 79 PID 4584 wrote to memory of 4980 4584 rundll32.exe 79 PID 4584 wrote to memory of 4980 4584 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e14fb17c9d237657ed9c06f75b2ab145ec086d8cf6ac7da525313f40ad3a49e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e14fb17c9d237657ed9c06f75b2ab145ec086d8cf6ac7da525313f40ad3a49e.dll,#12⤵PID:4980
-