Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
2acc3849fa1593a324437493db63065f22843bb340f9f7c7489436a263cbafcd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2acc3849fa1593a324437493db63065f22843bb340f9f7c7489436a263cbafcd.dll
Resource
win10v2004-20220812-en
General
-
Target
2acc3849fa1593a324437493db63065f22843bb340f9f7c7489436a263cbafcd.dll
-
Size
6KB
-
MD5
443a3dc927bb6ba580ccad994d8b6d54
-
SHA1
f43f39df1943a5135bd313bbfd39c7ef98ceeb11
-
SHA256
2acc3849fa1593a324437493db63065f22843bb340f9f7c7489436a263cbafcd
-
SHA512
faeda852d37e5616b1f645dec5ecd4b2394a61b9b601d68f811ac545bfc2c34f25fd8de0d5a961f582a9e12d0fb0cfcc95b811922b98a76a61a7c2987b10f438
-
SSDEEP
192:EHRh1epp9w03R220w5Ps9aX4IY0u0/60PO:EHRODw0B220wps944IY0u0/60P
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4468 wrote to memory of 2084 4468 rundll32.exe 81 PID 4468 wrote to memory of 2084 4468 rundll32.exe 81 PID 4468 wrote to memory of 2084 4468 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2acc3849fa1593a324437493db63065f22843bb340f9f7c7489436a263cbafcd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2acc3849fa1593a324437493db63065f22843bb340f9f7c7489436a263cbafcd.dll,#12⤵PID:2084
-