Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 17:21
Static task
static1
Behavioral task
behavioral1
Sample
d0ba2bd4d4df9b03521819b14f8c0f17afb43d88d16d8725aa948a8d46d40534.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
General
-
Target
d0ba2bd4d4df9b03521819b14f8c0f17afb43d88d16d8725aa948a8d46d40534.dll
-
Size
634KB
-
MD5
13962f530d12c8ecba9c1747a29f33e0
-
SHA1
ac4a117e12bfd28200cf5e123d1e09697ce047bc
-
SHA256
d0ba2bd4d4df9b03521819b14f8c0f17afb43d88d16d8725aa948a8d46d40534
-
SHA512
4fdb9de30d1e67992b4a5c417585ce1f36f7860eec85dc67e33dc137ca8a6b596667e7b57d7fcab0d378d1eeeb2e673db3140eb1218a173d32a7809061a49186
-
SSDEEP
3072:o6pU5Y1DXnbMn7Uzkop61/dAzV2O3XwTBftrm2YedGf3QKZDU:o6C5AXbMn7UI1FoV2gwTBlrIckPi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4332 wrote to memory of 3468 4332 rundll32.exe 79 PID 4332 wrote to memory of 3468 4332 rundll32.exe 79 PID 4332 wrote to memory of 3468 4332 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0ba2bd4d4df9b03521819b14f8c0f17afb43d88d16d8725aa948a8d46d40534.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0ba2bd4d4df9b03521819b14f8c0f17afb43d88d16d8725aa948a8d46d40534.dll,#12⤵PID:3468
-