Analysis
-
max time kernel
92s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 12:29
Static task
static1
Behavioral task
behavioral1
Sample
6d86753e67e3f10d3f6f20859a461f4718cbcfd29e8a37c38cfcd6a87f030b71.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d86753e67e3f10d3f6f20859a461f4718cbcfd29e8a37c38cfcd6a87f030b71.dll
Resource
win10v2004-20220812-en
General
-
Target
6d86753e67e3f10d3f6f20859a461f4718cbcfd29e8a37c38cfcd6a87f030b71.dll
-
Size
175KB
-
MD5
0542836e666a8d4952b994f0a0d49200
-
SHA1
f3780bebea334ef4e226e04760fd8c5963a16d13
-
SHA256
6d86753e67e3f10d3f6f20859a461f4718cbcfd29e8a37c38cfcd6a87f030b71
-
SHA512
fd789e13513fc98d7b5c26f237d81e610d56f4010cdec03d364cae92f3da1220c1b97c73cb659349367dfbdca90a88220ef92ffffe543a0d6200d5c7da36e296
-
SSDEEP
3072:AlcNNqwnIuJQEYgcf9uy4O+Svs3KnxaAs8RDE9:AlVSKH59uy4OLUb8C9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4972 wrote to memory of 5060 4972 rundll32.exe 80 PID 4972 wrote to memory of 5060 4972 rundll32.exe 80 PID 4972 wrote to memory of 5060 4972 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d86753e67e3f10d3f6f20859a461f4718cbcfd29e8a37c38cfcd6a87f030b71.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d86753e67e3f10d3f6f20859a461f4718cbcfd29e8a37c38cfcd6a87f030b71.dll,#12⤵PID:5060
-