Analysis
-
max time kernel
158s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
d002092a05ae5a8dabe5c3895990327f393f0d93814ba26b0f9abf9987c3c3bc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d002092a05ae5a8dabe5c3895990327f393f0d93814ba26b0f9abf9987c3c3bc.dll
Resource
win10v2004-20221111-en
General
-
Target
d002092a05ae5a8dabe5c3895990327f393f0d93814ba26b0f9abf9987c3c3bc.dll
-
Size
4KB
-
MD5
34d0cbf8fbefb18dcdeaf73b5e809080
-
SHA1
be87d426ca15118bfc78273f71fddcc8fa1ad607
-
SHA256
d002092a05ae5a8dabe5c3895990327f393f0d93814ba26b0f9abf9987c3c3bc
-
SHA512
d48d0795a76c459d4856c7cfdb2ae7e415f50e4da873326dfa4ca56549b835acbdf100d648537f3eff5342bdb6520a3b2c8f4006d1dcc5486e70f1ff04f3d723
-
SSDEEP
48:qHupGeMcCB96DrhWHR0FiIsipZlM+u+eAPMDQHpyuLv6omMJzmAwCi/:PMXB0rw0MI/pwbdE0/CU
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1412 wrote to memory of 4236 1412 rundll32.exe 81 PID 1412 wrote to memory of 4236 1412 rundll32.exe 81 PID 1412 wrote to memory of 4236 1412 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d002092a05ae5a8dabe5c3895990327f393f0d93814ba26b0f9abf9987c3c3bc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d002092a05ae5a8dabe5c3895990327f393f0d93814ba26b0f9abf9987c3c3bc.dll,#12⤵PID:4236
-