Analysis
-
max time kernel
183s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:26
Static task
static1
Behavioral task
behavioral1
Sample
b5021650e7098ce1d5bf1a4ad0852d5a32e5de6e741800af9fb5e14a58dfab87.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5021650e7098ce1d5bf1a4ad0852d5a32e5de6e741800af9fb5e14a58dfab87.dll
Resource
win10v2004-20220812-en
General
-
Target
b5021650e7098ce1d5bf1a4ad0852d5a32e5de6e741800af9fb5e14a58dfab87.dll
-
Size
99KB
-
MD5
18aa3e70cdb12afbde5dd87372c689b0
-
SHA1
0462af38b0645df52c4ae094ba85d30f79792166
-
SHA256
b5021650e7098ce1d5bf1a4ad0852d5a32e5de6e741800af9fb5e14a58dfab87
-
SHA512
f535d44d63b5af5e43351a8e0655ce64322ff068bbe7c9f3a114f7a907a72a07945ea60c7cc72d9ada9cef7c1e58a3e0206388131c14d63ef4a33c906c1f0282
-
SSDEEP
1536:QoqY2Q4vGRKSh3d2Sy7xl0axozMXqtGNttyZunJE9:j2NvGcSX47xl0axo46tGNttyZj9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4352 wrote to memory of 456 4352 rundll32.exe rundll32.exe PID 4352 wrote to memory of 456 4352 rundll32.exe rundll32.exe PID 4352 wrote to memory of 456 4352 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b5021650e7098ce1d5bf1a4ad0852d5a32e5de6e741800af9fb5e14a58dfab87.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b5021650e7098ce1d5bf1a4ad0852d5a32e5de6e741800af9fb5e14a58dfab87.dll,#12⤵PID:456