Analysis
-
max time kernel
165s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8.dll
Resource
win10v2004-20221111-en
General
-
Target
6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8.dll
-
Size
280KB
-
MD5
e5c32728347536f903877bd7c666b2a5
-
SHA1
b387c05026513e52c4c9057d1cc85be70f743bd6
-
SHA256
6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8
-
SHA512
df1bb68d7a27bf4388c01bd3101d8872662cbae90ea71b005b47b6b2bc01b4ab8047cb8b4f4539c6315e793542eb95fe0a21c740c8127c8fa219608a6a271a52
-
SSDEEP
3072:hddvsfm7qaGC2nbWh4FVrlX0tF2FIRp+nwHMug2pFoYSa2M6ueJsueqfdlxbWz:ho3bWA08IRpOVMQueJsueqf3d
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4404 wrote to memory of 3856 4404 rundll32.exe 81 PID 4404 wrote to memory of 3856 4404 rundll32.exe 81 PID 4404 wrote to memory of 3856 4404 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6067bceb64287c02fcc19960bd77f44447eea478c3d0be9bcf6ac87a60ad5ff8.dll,#12⤵PID:3856
-