Analysis
-
max time kernel
179s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:53
Static task
static1
Behavioral task
behavioral1
Sample
aa2f02f11301a0f28cbd965c28b1a7cbd691c6278f2f054c80d9b1ec898881c3.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa2f02f11301a0f28cbd965c28b1a7cbd691c6278f2f054c80d9b1ec898881c3.dll
Resource
win10v2004-20221111-en
General
-
Target
aa2f02f11301a0f28cbd965c28b1a7cbd691c6278f2f054c80d9b1ec898881c3.dll
-
Size
232KB
-
MD5
910d97b5abdf7f5aa296acfee49f0ac5
-
SHA1
c5ee64e71982872867df3bcf3fb6df57e25c31af
-
SHA256
aa2f02f11301a0f28cbd965c28b1a7cbd691c6278f2f054c80d9b1ec898881c3
-
SHA512
e6c780ac4f6fe219b9fd5cabfa80925e5d920be0a871211b16016f0b7768f8784847221d98b57d12670517e8b78c8b3bbd0797d4314a87dd185a36841dbe7280
-
SSDEEP
3072:njW/EyKcC0sogzFYSyKEfhq142TbrfWo3E5oIPBPuAvpnZlaa3a343E8a3C3O3VE:a/VC0g6HTBoy1pFW/U
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1620 wrote to memory of 3880 1620 rundll32.exe 82 PID 1620 wrote to memory of 3880 1620 rundll32.exe 82 PID 1620 wrote to memory of 3880 1620 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa2f02f11301a0f28cbd965c28b1a7cbd691c6278f2f054c80d9b1ec898881c3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa2f02f11301a0f28cbd965c28b1a7cbd691c6278f2f054c80d9b1ec898881c3.dll,#12⤵PID:3880
-