Analysis
-
max time kernel
179s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
7655605a80ac3370f1dbd644cf355e92e93d239b746d2afbf2129cc77b216d29.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7655605a80ac3370f1dbd644cf355e92e93d239b746d2afbf2129cc77b216d29.dll
Resource
win10v2004-20221111-en
General
-
Target
7655605a80ac3370f1dbd644cf355e92e93d239b746d2afbf2129cc77b216d29.dll
-
Size
93KB
-
MD5
6f2c90edfc70ced93e4d5b283c930952
-
SHA1
547d5f88b104b54834eaf5809ec50307d8f03587
-
SHA256
7655605a80ac3370f1dbd644cf355e92e93d239b746d2afbf2129cc77b216d29
-
SHA512
84b1703c7633b216a92056666c967e6a3f8fa622e1f43cc7767dbb73d5277aa11e23e8d8578931e78b4d18f2a3b9df8712e58a0ea26d37117b44e375dd5cd60a
-
SSDEEP
1536:EbF9eWiH3YeODNQh3JOJjNkt7+uw+qhst+uhZ+XY:YtiH3YzY3JOJjqN+umhst+Qn
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4704 wrote to memory of 2132 4704 rundll32.exe 83 PID 4704 wrote to memory of 2132 4704 rundll32.exe 83 PID 4704 wrote to memory of 2132 4704 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7655605a80ac3370f1dbd644cf355e92e93d239b746d2afbf2129cc77b216d29.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7655605a80ac3370f1dbd644cf355e92e93d239b746d2afbf2129cc77b216d29.dll,#12⤵PID:2132
-