Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
6ea59c65a2eae3a49147358d683a6392a284c970a0caeb4358b3e132959cd6a4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6ea59c65a2eae3a49147358d683a6392a284c970a0caeb4358b3e132959cd6a4.dll
Resource
win10v2004-20220901-en
General
-
Target
6ea59c65a2eae3a49147358d683a6392a284c970a0caeb4358b3e132959cd6a4.dll
-
Size
579KB
-
MD5
51d553995818860fd2d02e3f827b2232
-
SHA1
0de9a1213d4ed2360f81de6e38ae965b495fd977
-
SHA256
6ea59c65a2eae3a49147358d683a6392a284c970a0caeb4358b3e132959cd6a4
-
SHA512
70ceb4bc3c3767abb2a20f5530a4762d3b4c0e2bd8f4ba8a968b50d1313ac464082859ad606f30e14fb8dbc3856aa92cc32464e5d5ff4babe89d4e2b3ebe433b
-
SSDEEP
12288:bDimyz8lZGTLZB/RrHb3DoLsTFcnlQas2F+:rZMZrrHb3DoLsTF6hs8+
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3392 4384 rundll32.exe 81 PID 4384 wrote to memory of 3392 4384 rundll32.exe 81 PID 4384 wrote to memory of 3392 4384 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ea59c65a2eae3a49147358d683a6392a284c970a0caeb4358b3e132959cd6a4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ea59c65a2eae3a49147358d683a6392a284c970a0caeb4358b3e132959cd6a4.dll,#12⤵PID:3392
-