Analysis
-
max time kernel
159s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
9e4673e637e85a08ddaf909290b05c972bf02192d0dddce3855c6e3aff2b5f93.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9e4673e637e85a08ddaf909290b05c972bf02192d0dddce3855c6e3aff2b5f93.dll
Resource
win10v2004-20220812-en
General
-
Target
9e4673e637e85a08ddaf909290b05c972bf02192d0dddce3855c6e3aff2b5f93.dll
-
Size
129KB
-
MD5
363a7ee8ff675f75c0a01eaddae3e498
-
SHA1
16ae7608ff7da16cfb4dd55a40810320fe192095
-
SHA256
9e4673e637e85a08ddaf909290b05c972bf02192d0dddce3855c6e3aff2b5f93
-
SHA512
c3d2d7e36e3cd4ff6b437cd61651e1800693ae3ca8f63e6d29dd9c84645f6a6b818de85188d670ebb6e9fd1b18f8c498e5c8fb4c24ff6e84bad4eea5db3246d7
-
SSDEEP
1536:zy4bdYfZfXMWBFK8gqlgH+VF9OvXtPtUXX2nlUL465ZSVRUSHqSrTF6xtk1UtacV:PcDI8gqeH+VFIvXxC2WdW3xTF9ITWHw
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4776 4852 rundll32.exe 80 PID 4852 wrote to memory of 4776 4852 rundll32.exe 80 PID 4852 wrote to memory of 4776 4852 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e4673e637e85a08ddaf909290b05c972bf02192d0dddce3855c6e3aff2b5f93.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e4673e637e85a08ddaf909290b05c972bf02192d0dddce3855c6e3aff2b5f93.dll,#12⤵PID:4776
-