Analysis
-
max time kernel
186s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:08
Static task
static1
Behavioral task
behavioral1
Sample
76ce427bd0eacede60430d7f0f400b0b611128b1a0fa6fbc52778c622d586896.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
76ce427bd0eacede60430d7f0f400b0b611128b1a0fa6fbc52778c622d586896.dll
Resource
win10v2004-20221111-en
General
-
Target
76ce427bd0eacede60430d7f0f400b0b611128b1a0fa6fbc52778c622d586896.dll
-
Size
576KB
-
MD5
1409c30d7aefca48847ed05efa8fca34
-
SHA1
79a01e8f52536b836e416e03ee84f7acd4ecf744
-
SHA256
76ce427bd0eacede60430d7f0f400b0b611128b1a0fa6fbc52778c622d586896
-
SHA512
11e08ec35dff9a0e5246a25fe9b6e210eec9753cb695f009084c6fc739b3b8aa8109561d219cd79e3b1334e6350659d9eabc58318250c5e3147a945cf966df28
-
SSDEEP
6144:gZ5jsQkfmawBd2198cVnzkLPmw1VKSn1wHAw4xFQ1te1gW:gLQhU2gc1zkLP6Kwd4xuP
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 624 wrote to memory of 4576 624 rundll32.exe rundll32.exe PID 624 wrote to memory of 4576 624 rundll32.exe rundll32.exe PID 624 wrote to memory of 4576 624 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76ce427bd0eacede60430d7f0f400b0b611128b1a0fa6fbc52778c622d586896.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76ce427bd0eacede60430d7f0f400b0b611128b1a0fa6fbc52778c622d586896.dll,#12⤵PID:4576