Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:00
Static task
static1
Behavioral task
behavioral1
Sample
dc7c290ae15fecaf81eebfa952eb250f3fa35d329a3e771f85a2b3a8e31b83d0.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dc7c290ae15fecaf81eebfa952eb250f3fa35d329a3e771f85a2b3a8e31b83d0.dll
Resource
win10v2004-20220812-en
General
-
Target
dc7c290ae15fecaf81eebfa952eb250f3fa35d329a3e771f85a2b3a8e31b83d0.dll
-
Size
17KB
-
MD5
eb0c8e2234654a3095ec8d87fbf1a0f8
-
SHA1
9377bbe1e65971561a24b00c110c93b1c3adce39
-
SHA256
dc7c290ae15fecaf81eebfa952eb250f3fa35d329a3e771f85a2b3a8e31b83d0
-
SHA512
bac21fa19a01690a5b0128d413e59c600cd95744f05c6128a0089cc68dafe832a1b24ad59aa73d45cdad26b8c583a7a327e26cd8e9f16e010b25af5a4017b61b
-
SSDEEP
192:QiZGEugbRVYLHm1DlBpn1uX/84Q4V+vGgKvT+lvxLj3NlEz/eQxEdFIO6rtvn7:pZGYbRVYzwlBDuPbHVQGCv9jhCO0v7
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 940 wrote to memory of 1140 940 rundll32.exe rundll32.exe PID 940 wrote to memory of 1140 940 rundll32.exe rundll32.exe PID 940 wrote to memory of 1140 940 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc7c290ae15fecaf81eebfa952eb250f3fa35d329a3e771f85a2b3a8e31b83d0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc7c290ae15fecaf81eebfa952eb250f3fa35d329a3e771f85a2b3a8e31b83d0.dll,#12⤵PID:1140