Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 05:14
Behavioral task
behavioral1
Sample
02bc4d23a2b8b8b8517738bd4440c4183a11b6c7b1b2eaecdfaccd480603755e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
02bc4d23a2b8b8b8517738bd4440c4183a11b6c7b1b2eaecdfaccd480603755e.dll
Resource
win10v2004-20220812-en
General
-
Target
02bc4d23a2b8b8b8517738bd4440c4183a11b6c7b1b2eaecdfaccd480603755e.dll
-
Size
52KB
-
MD5
08dfa5425db0bcfc0b5b59e7430b93c0
-
SHA1
44ea6ffc4c5cdec4fa732c48e9a216b0cce8d7a0
-
SHA256
02bc4d23a2b8b8b8517738bd4440c4183a11b6c7b1b2eaecdfaccd480603755e
-
SHA512
d2f5848e9f0a5cfd96cc52f128ccc3d456c6214dbb3116205ca59a77a19b8d21c883cb1cdb95eb621065b3b81c97c48a3247242866c1430620105b514499d1f3
-
SSDEEP
768:4zO58xEzV+30y0zOYnbaWdINDOhQUP2XHHAeEPmP18qyuqvWdbQw2Y90h8dJT4g:4nxEk6PnhQG2QeEOP18qyBWdbRMkTf
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3172 wrote to memory of 3504 3172 rundll32.exe 80 PID 3172 wrote to memory of 3504 3172 rundll32.exe 80 PID 3172 wrote to memory of 3504 3172 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02bc4d23a2b8b8b8517738bd4440c4183a11b6c7b1b2eaecdfaccd480603755e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02bc4d23a2b8b8b8517738bd4440c4183a11b6c7b1b2eaecdfaccd480603755e.dll,#12⤵PID:3504
-