Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:30
Static task
static1
Behavioral task
behavioral1
Sample
870881852053995c7a1434a9ae39093afb77592bccc69d5f0dd4f1b4c7f3227d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
870881852053995c7a1434a9ae39093afb77592bccc69d5f0dd4f1b4c7f3227d.dll
Resource
win10v2004-20220812-en
General
-
Target
870881852053995c7a1434a9ae39093afb77592bccc69d5f0dd4f1b4c7f3227d.dll
-
Size
45KB
-
MD5
42f7f8baa285d22257066d265d516bb1
-
SHA1
6bd3c40535a22212639ca1a1e77ab61f6c9b2e90
-
SHA256
870881852053995c7a1434a9ae39093afb77592bccc69d5f0dd4f1b4c7f3227d
-
SHA512
467c83a7014a8131578ede3dfaab65d961f1637a15f70b32966ad7d4d76016822619c08dd73bb849094e1bdad3298bea63e1eef38f93004edf72a6ea7439280a
-
SSDEEP
768:AwYJ3Z19UVHmgOMtitTjxyNq5ewMwkjw5I9tGqADjMl6t:DY19UC4WTQNqNfkjw2GCl
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4020 wrote to memory of 4092 4020 rundll32.exe rundll32.exe PID 4020 wrote to memory of 4092 4020 rundll32.exe rundll32.exe PID 4020 wrote to memory of 4092 4020 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\870881852053995c7a1434a9ae39093afb77592bccc69d5f0dd4f1b4c7f3227d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\870881852053995c7a1434a9ae39093afb77592bccc69d5f0dd4f1b4c7f3227d.dll,#12⤵PID:4092