Analysis
-
max time kernel
172s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:48
Static task
static1
Behavioral task
behavioral1
Sample
ad69bd20bda9e3926105edbee2f62f0ce4f6d506b7bc63af0e2b6de1edaa9d1f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad69bd20bda9e3926105edbee2f62f0ce4f6d506b7bc63af0e2b6de1edaa9d1f.dll
Resource
win10v2004-20221111-en
General
-
Target
ad69bd20bda9e3926105edbee2f62f0ce4f6d506b7bc63af0e2b6de1edaa9d1f.dll
-
Size
65KB
-
MD5
52adc49711d65ceeb48dc40745990c4f
-
SHA1
5cc08b3daec3edbdd98549fe9d739e9876877c1f
-
SHA256
ad69bd20bda9e3926105edbee2f62f0ce4f6d506b7bc63af0e2b6de1edaa9d1f
-
SHA512
9b521ec0e212256ef83711d80ba23dab3d59877ba33519a979e695f7168b8fe702d835c92d975ad0f7afb324107abe7c1046c9e2a2914882471f2e3608079972
-
SSDEEP
1536:1HObXf6UznlDIdvNdco86dcmpydxreGpamvw9u/:1HiiUzBAN26dcmgrrbpamvw9i
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4120 wrote to memory of 2964 4120 rundll32.exe rundll32.exe PID 4120 wrote to memory of 2964 4120 rundll32.exe rundll32.exe PID 4120 wrote to memory of 2964 4120 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad69bd20bda9e3926105edbee2f62f0ce4f6d506b7bc63af0e2b6de1edaa9d1f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad69bd20bda9e3926105edbee2f62f0ce4f6d506b7bc63af0e2b6de1edaa9d1f.dll,#12⤵PID:2964