Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 14:11
Behavioral task
behavioral1
Sample
8d8de3e3f7fe8f99d64acbcf98ca66637f262abdb8cc8f6ce070acf97ebb807f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d8de3e3f7fe8f99d64acbcf98ca66637f262abdb8cc8f6ce070acf97ebb807f.dll
Resource
win10v2004-20220812-en
General
-
Target
8d8de3e3f7fe8f99d64acbcf98ca66637f262abdb8cc8f6ce070acf97ebb807f.dll
-
Size
632KB
-
MD5
7735ef8958ec1170abd7839d98010f56
-
SHA1
1670c6a11390aa9e34975d71a8a3ec20de146758
-
SHA256
8d8de3e3f7fe8f99d64acbcf98ca66637f262abdb8cc8f6ce070acf97ebb807f
-
SHA512
f3184274835dbcedf3cde8d8dcc06cd71a324081127017b07f7ac4b0e529689e3c121f1014eb963b3840dc0f3a9d06568a234e8b0e836f55d8a97658e6bee6aa
-
SSDEEP
12288:pCxF93DgvgyMK48On/OHoGDQYm3++6Hi1BkQDVNRh52auqeV17:pWh+g58OqoGEYWH6C1BkCRzuq8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4360-133-0x0000000000400000-0x000000000055D000-memory.dmp vmprotect behavioral2/memory/4360-135-0x0000000000400000-0x000000000055D000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1664 wrote to memory of 4360 1664 rundll32.exe rundll32.exe PID 1664 wrote to memory of 4360 1664 rundll32.exe rundll32.exe PID 1664 wrote to memory of 4360 1664 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d8de3e3f7fe8f99d64acbcf98ca66637f262abdb8cc8f6ce070acf97ebb807f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d8de3e3f7fe8f99d64acbcf98ca66637f262abdb8cc8f6ce070acf97ebb807f.dll,#12⤵PID:4360
-