Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
5e44416130dc9c94522cbdf213742b6c66fef9a20c5276719f2f8a6333635c6b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5e44416130dc9c94522cbdf213742b6c66fef9a20c5276719f2f8a6333635c6b.dll
Resource
win10v2004-20221111-en
General
-
Target
5e44416130dc9c94522cbdf213742b6c66fef9a20c5276719f2f8a6333635c6b.dll
-
Size
88KB
-
MD5
84f73873ae5fa41a274bbe3333e705b3
-
SHA1
19767762255d8c9a1ecc42c662dd33b0ffc11f66
-
SHA256
5e44416130dc9c94522cbdf213742b6c66fef9a20c5276719f2f8a6333635c6b
-
SHA512
4aa270284935e15a69ebf7ada9e6653f2fcf0ade93383ced6de2c8cfe0140a20b242311a5f591fe2766a811b2cff6c568a34010ad599bede9c0ed034ee7d1a1a
-
SSDEEP
1536:3ohsQOBxOWxKT2HZaum0JPx5tAYz0Jfob2v9oIGRf:3ohip0TIsuXtGJfob
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3688 wrote to memory of 4220 3688 rundll32.exe 80 PID 3688 wrote to memory of 4220 3688 rundll32.exe 80 PID 3688 wrote to memory of 4220 3688 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e44416130dc9c94522cbdf213742b6c66fef9a20c5276719f2f8a6333635c6b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e44416130dc9c94522cbdf213742b6c66fef9a20c5276719f2f8a6333635c6b.dll,#12⤵PID:4220
-