Analysis
-
max time kernel
153s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:01
Static task
static1
Behavioral task
behavioral1
Sample
d440d728d8944008d58f2c5b3aa400a296f35ce675fa45b949607772df7eaf64.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d440d728d8944008d58f2c5b3aa400a296f35ce675fa45b949607772df7eaf64.dll
Resource
win10v2004-20221111-en
General
-
Target
d440d728d8944008d58f2c5b3aa400a296f35ce675fa45b949607772df7eaf64.dll
-
Size
348KB
-
MD5
b1b797f82cf829020590674836f4f294
-
SHA1
8eb70c0bf1867f721d6158608b832b83f0a66285
-
SHA256
d440d728d8944008d58f2c5b3aa400a296f35ce675fa45b949607772df7eaf64
-
SHA512
175b4f144cc9af2ec844fcac92f04c56fd359982be74751b6035aa078ef38714e8c395d2ffd0de4f85b9a947bf83af3193f243a77c59fe627370fd49b1947237
-
SSDEEP
6144:K64keXUY5/FMuP2q8iQeeaQeepQeesQeeGrQeehQeeHOg4oV4GTO+MvsY:KFdXUYBFM6Dgn52
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 31 3380 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4292 wrote to memory of 3380 4292 rundll32.exe rundll32.exe PID 4292 wrote to memory of 3380 4292 rundll32.exe rundll32.exe PID 4292 wrote to memory of 3380 4292 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d440d728d8944008d58f2c5b3aa400a296f35ce675fa45b949607772df7eaf64.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d440d728d8944008d58f2c5b3aa400a296f35ce675fa45b949607772df7eaf64.dll,#12⤵
- Blocklisted process makes network request
PID:3380