Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
f98a9d79311eee422e857429fe56e7ef5a0257b88d7fa44090db9c92d373f6ed.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f98a9d79311eee422e857429fe56e7ef5a0257b88d7fa44090db9c92d373f6ed.dll
Resource
win10v2004-20221111-en
General
-
Target
f98a9d79311eee422e857429fe56e7ef5a0257b88d7fa44090db9c92d373f6ed.dll
-
Size
566KB
-
MD5
2b580a864647c1a7db2e411c79b19cd0
-
SHA1
a91b494cc2b92e9ac1fd7b82568bd1d9c65749ad
-
SHA256
f98a9d79311eee422e857429fe56e7ef5a0257b88d7fa44090db9c92d373f6ed
-
SHA512
121ce640cfb661f35d2c2fdaa8f59e59d722845c1b8acfb39663a237958c2f37e92dbf2f5c66d7b8fba7ad7e950f0939cf3693fdaf158d254ed0ded6f5b01f1f
-
SSDEEP
12288:sXTcAQ5a+RuZ1Mb9THayzIPCdFkecQefseI3/ck35pXtJlaO8:sXQAd+RuZ+b9LtzuCdFrS1EppXtJlV8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4540 wrote to memory of 2348 4540 rundll32.exe 82 PID 4540 wrote to memory of 2348 4540 rundll32.exe 82 PID 4540 wrote to memory of 2348 4540 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f98a9d79311eee422e857429fe56e7ef5a0257b88d7fa44090db9c92d373f6ed.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f98a9d79311eee422e857429fe56e7ef5a0257b88d7fa44090db9c92d373f6ed.dll,#12⤵PID:2348
-