Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 05:09
Behavioral task
behavioral1
Sample
1712adfbc2cd406a73fb34b03c8313dcc5ba6d88c49ac25738bc0d27c6941cc1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1712adfbc2cd406a73fb34b03c8313dcc5ba6d88c49ac25738bc0d27c6941cc1.dll
Resource
win10v2004-20220812-en
General
-
Target
1712adfbc2cd406a73fb34b03c8313dcc5ba6d88c49ac25738bc0d27c6941cc1.dll
-
Size
22KB
-
MD5
0c94dfea9d0e4f0f4a6607a906d88c30
-
SHA1
c0375254aa8d1c937709e3f19751d24bb7df3b62
-
SHA256
1712adfbc2cd406a73fb34b03c8313dcc5ba6d88c49ac25738bc0d27c6941cc1
-
SHA512
549bd6fcef37ffed62fcaa2207fcc47e43ba2a07fcdbc5ae0da4020fb8ba239bf1e1e91ecd66157d2aa33f4300d47b263448e3857a73e0461a95cb7368e1497e
-
SSDEEP
384:3QJPDrZIs+y7EvsJ5KLyueKzzsPQwoh57zxBLVyUFK+fDApGaX1/pglXrEV:yPDrCs+qEkJ5KeK+7oLfVyUFDwBpAXg
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 900 5112 rundll32.exe 81 PID 5112 wrote to memory of 900 5112 rundll32.exe 81 PID 5112 wrote to memory of 900 5112 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1712adfbc2cd406a73fb34b03c8313dcc5ba6d88c49ac25738bc0d27c6941cc1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1712adfbc2cd406a73fb34b03c8313dcc5ba6d88c49ac25738bc0d27c6941cc1.dll,#12⤵PID:900
-