Analysis
-
max time kernel
91s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2022 10:05
Static task
static1
Behavioral task
behavioral1
Sample
1a7324389128d47b3f281d380e60adf2db1f2a6b4fe788c47bfc894b700fc123.dll
Resource
win7-20220901-en
windows7-x64
2 signatures
150 seconds
General
-
Target
1a7324389128d47b3f281d380e60adf2db1f2a6b4fe788c47bfc894b700fc123.dll
-
Size
752KB
-
MD5
31f76fecf08a93e9b82ee858089c3960
-
SHA1
444ed07d4916f0b1d232c975a635170cc78d5f25
-
SHA256
1a7324389128d47b3f281d380e60adf2db1f2a6b4fe788c47bfc894b700fc123
-
SHA512
2d1ef65202389751cda78c849c11a06fde9b7342aaf12283de2d4f39e8ac6e2f8b1e95920b1a98b0dc129cc71796cc76bd98a729e41b0ed60447249c1cab7305
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0N:jDgtfRQUHPw06MoV2nwTBlhm8V
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4892 4824 rundll32.exe 80 PID 4824 wrote to memory of 4892 4824 rundll32.exe 80 PID 4824 wrote to memory of 4892 4824 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a7324389128d47b3f281d380e60adf2db1f2a6b4fe788c47bfc894b700fc123.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a7324389128d47b3f281d380e60adf2db1f2a6b4fe788c47bfc894b700fc123.dll,#12⤵PID:4892
-