Analysis
-
max time kernel
228s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:15
Static task
static1
Behavioral task
behavioral1
Sample
586475a4e6f2993e517e7674aff375bae4ef4db8a177d0572dccac1c08145c7e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
586475a4e6f2993e517e7674aff375bae4ef4db8a177d0572dccac1c08145c7e.dll
Resource
win10v2004-20221111-en
General
-
Target
586475a4e6f2993e517e7674aff375bae4ef4db8a177d0572dccac1c08145c7e.dll
-
Size
65KB
-
MD5
d25449822fba906ee4ec99f9874f3083
-
SHA1
9d896c743f4de6e5d6ebb89363d9aeb19651c14a
-
SHA256
586475a4e6f2993e517e7674aff375bae4ef4db8a177d0572dccac1c08145c7e
-
SHA512
58d225e199ba92c30d331028bac80b158c19df6d0be7f25ca641a5b4b2b6ee8da56319611fa1eab7b258fc7cacf2079c00a8a097e110c38ec108166973ebf76d
-
SSDEEP
1536:Kf2JvYbF8xXlK7XU3kN/Sffpiz6aP5Og/dilcDJux+N+PT:KuymsT9/SfhizDhO+m652T
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4264 wrote to memory of 3492 4264 rundll32.exe rundll32.exe PID 4264 wrote to memory of 3492 4264 rundll32.exe rundll32.exe PID 4264 wrote to memory of 3492 4264 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\586475a4e6f2993e517e7674aff375bae4ef4db8a177d0572dccac1c08145c7e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\586475a4e6f2993e517e7674aff375bae4ef4db8a177d0572dccac1c08145c7e.dll,#12⤵PID:3492
-