Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 04:58
Behavioral task
behavioral1
Sample
b487dcf593cc94d5b0410ef4a793830b83631897e1de65dd9c4c2a1002288195.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b487dcf593cc94d5b0410ef4a793830b83631897e1de65dd9c4c2a1002288195.dll
Resource
win10v2004-20220901-en
General
-
Target
b487dcf593cc94d5b0410ef4a793830b83631897e1de65dd9c4c2a1002288195.dll
-
Size
54KB
-
MD5
085c8654252d023d0def5a014ed1f440
-
SHA1
86ffa87c3a60f8bc864a8efa0fb7d95dd97d63fd
-
SHA256
b487dcf593cc94d5b0410ef4a793830b83631897e1de65dd9c4c2a1002288195
-
SHA512
3f5a83876344d2bcde7e375a73aed12efeb3fdec121aa649cf455172743e2fc73276f4f476417a6381aeb00bf153eb4a5386ba95be28eb5a3c365246b25fcefb
-
SSDEEP
768:btxQVdbmPyxWN7RxP0uiRNXaQ68Pcv3gH7IkPAfW2w8ZwmvZEnIAojG/x0vkMq1K:PPyxsHsuANnCy7IvfW8LjG/CvVq1hEF
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2204 2044 rundll32.exe 81 PID 2044 wrote to memory of 2204 2044 rundll32.exe 81 PID 2044 wrote to memory of 2204 2044 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b487dcf593cc94d5b0410ef4a793830b83631897e1de65dd9c4c2a1002288195.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b487dcf593cc94d5b0410ef4a793830b83631897e1de65dd9c4c2a1002288195.dll,#12⤵PID:2204
-