Analysis
-
max time kernel
153s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
45ff77adbf076b47f0bec201a17576502b97a78634b1ebb18bcecccd8fd97d3c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
45ff77adbf076b47f0bec201a17576502b97a78634b1ebb18bcecccd8fd97d3c.dll
Resource
win10v2004-20221111-en
General
-
Target
45ff77adbf076b47f0bec201a17576502b97a78634b1ebb18bcecccd8fd97d3c.dll
-
Size
82KB
-
MD5
80f3d37c85f6edf6712b66b527b8f87c
-
SHA1
4fb43ddc65f82522958d65c0ced35abc46827803
-
SHA256
45ff77adbf076b47f0bec201a17576502b97a78634b1ebb18bcecccd8fd97d3c
-
SHA512
6a8b9ce6b9f5efa3ca7535a42734a138f0f8fae05f56a38f615b5f3c2254d84a0e318117822af398748a02b92d53fc8d579082b8a5855cec45b74ad4f930679e
-
SSDEEP
1536:l4gSzqnxPOwrIysehL12Av5VST9hhAFwlVeNBrIv:l4gSzqnF5XhLgAv5VST9hhA+srI
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4288 wrote to memory of 5016 4288 rundll32.exe 83 PID 4288 wrote to memory of 5016 4288 rundll32.exe 83 PID 4288 wrote to memory of 5016 4288 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45ff77adbf076b47f0bec201a17576502b97a78634b1ebb18bcecccd8fd97d3c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45ff77adbf076b47f0bec201a17576502b97a78634b1ebb18bcecccd8fd97d3c.dll,#12⤵PID:5016
-