Analysis
-
max time kernel
61s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
47e31ed37b561398b8440323264f66fa8c9051bda0f7b112312db0cb9f579d58.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
47e31ed37b561398b8440323264f66fa8c9051bda0f7b112312db0cb9f579d58.dll
Resource
win10v2004-20220901-en
General
-
Target
47e31ed37b561398b8440323264f66fa8c9051bda0f7b112312db0cb9f579d58.dll
-
Size
153KB
-
MD5
15b0a6abf11b4dac194f898b680ae830
-
SHA1
cbf9f1c94ef9ae038b9a0fc57a487cbd8ba17917
-
SHA256
47e31ed37b561398b8440323264f66fa8c9051bda0f7b112312db0cb9f579d58
-
SHA512
4ae0751d852d33758bc16206af024f5702dc64ae1db60a81a4128acb0b43f225c6fb8da66c47069207b3dce6013e8189342c09e5da59a6674ab6948c7faddf02
-
SSDEEP
3072:8EBWw3m3JjQ4SGUsK7s8ZQcJ+6A4gVfAXKMsz/BJWOn4Q8GsZNco1/fzqLqQD:8qTm3JjQFsK7s8mcQZJWOn4JNHhfWLqE
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4396 3796 rundll32.exe 82 PID 3796 wrote to memory of 4396 3796 rundll32.exe 82 PID 3796 wrote to memory of 4396 3796 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\47e31ed37b561398b8440323264f66fa8c9051bda0f7b112312db0cb9f579d58.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\47e31ed37b561398b8440323264f66fa8c9051bda0f7b112312db0cb9f579d58.dll,#12⤵PID:4396
-