Analysis
-
max time kernel
168s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:10
Static task
static1
Behavioral task
behavioral1
Sample
de0369f6e73d852892d79aad4fbb4822d316bb927b39b2236c114c7e7cd3ff07.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
de0369f6e73d852892d79aad4fbb4822d316bb927b39b2236c114c7e7cd3ff07.dll
Resource
win10v2004-20221111-en
General
-
Target
de0369f6e73d852892d79aad4fbb4822d316bb927b39b2236c114c7e7cd3ff07.dll
-
Size
4KB
-
MD5
56106d6cef326fd1fd5dfa95cc363400
-
SHA1
1dc4d62efc083d241270d87838c398ffba18ab7a
-
SHA256
de0369f6e73d852892d79aad4fbb4822d316bb927b39b2236c114c7e7cd3ff07
-
SHA512
fee3d2fdaafbcff83506aa2ee115364c7374c600bbe43bdfbc360990535dc1925b5306e41a17b0f4fb62f121992557281f12c8201d99d4d52514eaf8e9d6aee0
-
SSDEEP
48:a5zjMTGcITBVQVE1lcaRrOevQ1BjlB/T1IEC/YwKAcFPG8c24hddgQ:iT3Qu8qrZI1nh15CQwKQpz
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 844 wrote to memory of 1156 844 rundll32.exe rundll32.exe PID 844 wrote to memory of 1156 844 rundll32.exe rundll32.exe PID 844 wrote to memory of 1156 844 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de0369f6e73d852892d79aad4fbb4822d316bb927b39b2236c114c7e7cd3ff07.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de0369f6e73d852892d79aad4fbb4822d316bb927b39b2236c114c7e7cd3ff07.dll,#12⤵PID:1156