Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 10:54
Static task
static1
Behavioral task
behavioral1
Sample
643e7f51f0873889065fc36633b3217cf8857ae93123bc80e88d788e8af04216.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
643e7f51f0873889065fc36633b3217cf8857ae93123bc80e88d788e8af04216.dll
Resource
win10v2004-20221111-en
General
-
Target
643e7f51f0873889065fc36633b3217cf8857ae93123bc80e88d788e8af04216.dll
-
Size
117KB
-
MD5
0a5674774e42d2af1ae635ecaeacced0
-
SHA1
5f2b6ce30b7152fb47e0922471d4930eb06bc5f7
-
SHA256
643e7f51f0873889065fc36633b3217cf8857ae93123bc80e88d788e8af04216
-
SHA512
d2a508b66e94cd19ebd5355e157def9ab2d8124e41cb64e6e542a6bf9f2d3d1ddbf9b5029ca785f673dac2c235721f5bab42c6b6c2f47a3fa8022558d2bbf0a5
-
SSDEEP
3072:v+6TCy3sEUnafop/zvW/8AcCIbOwYoa46mRRAr:W6TCy3sEUaQp/rblbOwtfti
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2516 1696 rundll32.exe 80 PID 1696 wrote to memory of 2516 1696 rundll32.exe 80 PID 1696 wrote to memory of 2516 1696 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\643e7f51f0873889065fc36633b3217cf8857ae93123bc80e88d788e8af04216.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\643e7f51f0873889065fc36633b3217cf8857ae93123bc80e88d788e8af04216.dll,#12⤵PID:2516
-