Analysis
-
max time kernel
167s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:08
Static task
static1
Behavioral task
behavioral1
Sample
d875f15d195e342ad010ebdd9587872ebbfc61fc4e574dd4ea61b3e68ecd743b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d875f15d195e342ad010ebdd9587872ebbfc61fc4e574dd4ea61b3e68ecd743b.dll
Resource
win10v2004-20220812-en
General
-
Target
d875f15d195e342ad010ebdd9587872ebbfc61fc4e574dd4ea61b3e68ecd743b.dll
-
Size
76KB
-
MD5
8adfbacc6021f8b252fd38052e09ad35
-
SHA1
5bee22bb1cf58576fdd211e7a0a9e1f1a50e7936
-
SHA256
d875f15d195e342ad010ebdd9587872ebbfc61fc4e574dd4ea61b3e68ecd743b
-
SHA512
2fc581eaf9a59b8296407cfc2bf1677989ed623f92d0bd2d66a2688345d8585752d233f453a111838af5eb977b20bcac5d0eb8e0e6c5e8633da3d9df3a980643
-
SSDEEP
1536:oAcF2O06bL7BwVhPAl3gfqPd9EWJZng5yzvTWcJshrrkpGIHqtT:oAcsO0WLYhPAlCcTJOyRHpvk
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3420 wrote to memory of 3948 3420 rundll32.exe rundll32.exe PID 3420 wrote to memory of 3948 3420 rundll32.exe rundll32.exe PID 3420 wrote to memory of 3948 3420 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d875f15d195e342ad010ebdd9587872ebbfc61fc4e574dd4ea61b3e68ecd743b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d875f15d195e342ad010ebdd9587872ebbfc61fc4e574dd4ea61b3e68ecd743b.dll,#12⤵PID:3948