Analysis
-
max time kernel
147s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 23:22
Static task
static1
Behavioral task
behavioral1
Sample
10ac27835003b05644aff4f4959a4f7f9785c16c3037340db8ad8542d481e50e.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
General
-
Target
10ac27835003b05644aff4f4959a4f7f9785c16c3037340db8ad8542d481e50e.dll
-
Size
235KB
-
MD5
5cd727e841ec16a5518faed39b5789a0
-
SHA1
a58a64b93068997c5bcbd0c6df788658116e64d2
-
SHA256
10ac27835003b05644aff4f4959a4f7f9785c16c3037340db8ad8542d481e50e
-
SHA512
05561c772026ea519e8750cffcb7786761213787196c6e6a6778f52023e008248cf30f74177549d4616ef9a976d037a45a7448a4a61de50a610485f8cc4aa341
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q07:jDgtfRQUHPw06MoV2nwTBlhm8D
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1516 wrote to memory of 5080 1516 rundll32.exe 80 PID 1516 wrote to memory of 5080 1516 rundll32.exe 80 PID 1516 wrote to memory of 5080 1516 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10ac27835003b05644aff4f4959a4f7f9785c16c3037340db8ad8542d481e50e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10ac27835003b05644aff4f4959a4f7f9785c16c3037340db8ad8542d481e50e.dll,#12⤵PID:5080
-