Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:42
Behavioral task
behavioral1
Sample
5b5290a7ebacc79ea67117e7353403937ea42bbffd2f39e902544063ee02aa54.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b5290a7ebacc79ea67117e7353403937ea42bbffd2f39e902544063ee02aa54.dll
Resource
win10v2004-20220812-en
General
-
Target
5b5290a7ebacc79ea67117e7353403937ea42bbffd2f39e902544063ee02aa54.dll
-
Size
43KB
-
MD5
52d90a37ff5cbf88d513956b0473f076
-
SHA1
754da0424baae9f488a0bfda213848c9be743cf3
-
SHA256
5b5290a7ebacc79ea67117e7353403937ea42bbffd2f39e902544063ee02aa54
-
SHA512
38309e6ba680e06268f87546e7e927d782104ff10ceed5845ba15f7300039603d6ffab82205cfc347815930d7ca86e3f3541af0ad7ddb414c459aafbb31460ce
-
SSDEEP
768:0tX7Gc6qdKTEIMNsxbia0aWgObcB9MrmJy/8r5M5UtlzRG+/6:0x4qHIWsxbialWnbK9MqJ48Nbl8F
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2040-133-0x0000000010000000-0x000000001001D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4004 wrote to memory of 2040 4004 rundll32.exe rundll32.exe PID 4004 wrote to memory of 2040 4004 rundll32.exe rundll32.exe PID 4004 wrote to memory of 2040 4004 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b5290a7ebacc79ea67117e7353403937ea42bbffd2f39e902544063ee02aa54.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b5290a7ebacc79ea67117e7353403937ea42bbffd2f39e902544063ee02aa54.dll,#12⤵PID:2040