Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2022 10:04
Static task
static1
Behavioral task
behavioral1
Sample
40a23b0fb20ebf7e31d104681ec2401e3ed259da942a66adc4961d5111efb59f.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
General
-
Target
40a23b0fb20ebf7e31d104681ec2401e3ed259da942a66adc4961d5111efb59f.dll
-
Size
600KB
-
MD5
13fac4bfb169a08feaa9c23112fe9f70
-
SHA1
173cc83eb166403995b1c0b13978f46aadc141bc
-
SHA256
40a23b0fb20ebf7e31d104681ec2401e3ed259da942a66adc4961d5111efb59f
-
SHA512
868a3201194f4c53e5ee3586cab72b277284e7787fb2701107242ced12431c08c265f2e663c95b0b71c178b3aa9f23596fdc517a8c1fc25f3c62418c3adfd627
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0X:jDgtfRQUHPw06MoV2nwTBlhm8f
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 2196 4444 rundll32.exe 82 PID 4444 wrote to memory of 2196 4444 rundll32.exe 82 PID 4444 wrote to memory of 2196 4444 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40a23b0fb20ebf7e31d104681ec2401e3ed259da942a66adc4961d5111efb59f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40a23b0fb20ebf7e31d104681ec2401e3ed259da942a66adc4961d5111efb59f.dll,#12⤵PID:2196
-