Analysis
-
max time kernel
181s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
50097701dc9d547f044f40b0d9c1e86e27ca72aa3bdd73cadca1ef357a7f5bb5.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
50097701dc9d547f044f40b0d9c1e86e27ca72aa3bdd73cadca1ef357a7f5bb5.dll
Resource
win10v2004-20221111-en
General
-
Target
50097701dc9d547f044f40b0d9c1e86e27ca72aa3bdd73cadca1ef357a7f5bb5.dll
-
Size
984KB
-
MD5
343d51f5b02e124377c1a18a084b90df
-
SHA1
26f858592f201407791465dd0bdbbe5cc3d9c474
-
SHA256
50097701dc9d547f044f40b0d9c1e86e27ca72aa3bdd73cadca1ef357a7f5bb5
-
SHA512
6078a4954cfb423373b07bbf3e9ec8235eccdef0c77af103fd1a97b8e986c4805acdd9af13f6f636fda0f93906f43981a7bd3fd9c99b8dbdace985a14fa33679
-
SSDEEP
24576:uwnpxkf3Y7oeW16clCukn/bPUjV5ITs36XuYaCmwjp:nnXk9hlAb2gTlua9l
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1524 wrote to memory of 5080 1524 rundll32.exe 81 PID 1524 wrote to memory of 5080 1524 rundll32.exe 81 PID 1524 wrote to memory of 5080 1524 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50097701dc9d547f044f40b0d9c1e86e27ca72aa3bdd73cadca1ef357a7f5bb5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50097701dc9d547f044f40b0d9c1e86e27ca72aa3bdd73cadca1ef357a7f5bb5.dll,#12⤵PID:5080
-