Analysis
-
max time kernel
189s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 08:44
Static task
static1
Behavioral task
behavioral1
Sample
11381fd4702c894fc7fb358f0ecf94c5eaadd38ca2e9bfefec43f4b955e6c0f7.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
11381fd4702c894fc7fb358f0ecf94c5eaadd38ca2e9bfefec43f4b955e6c0f7.dll
Resource
win10v2004-20221111-en
General
-
Target
11381fd4702c894fc7fb358f0ecf94c5eaadd38ca2e9bfefec43f4b955e6c0f7.dll
-
Size
490KB
-
MD5
0e432c4aa2bf01f4b079bfcb4f72f441
-
SHA1
a6ac79ca4492cd589efedce55b95b214976fb8c6
-
SHA256
11381fd4702c894fc7fb358f0ecf94c5eaadd38ca2e9bfefec43f4b955e6c0f7
-
SHA512
4998fc28393a254ea1e956b3399514ff50f9a37709b653bf073cdebfd774f6dcef8f5db1440793be61fdc03a06306909778d6b423a9220285b4226424fa5d56f
-
SSDEEP
6144:deLV3b6jyU0blABNwXBZMK2AMVK31Z7I9+cQKfIoOcJlCCHrCwLe9WCO64l:wLVL6+U03xp2AblGzQiIbC3LkWXh
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 4600 3068 rundll32.exe 82 PID 3068 wrote to memory of 4600 3068 rundll32.exe 82 PID 3068 wrote to memory of 4600 3068 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11381fd4702c894fc7fb358f0ecf94c5eaadd38ca2e9bfefec43f4b955e6c0f7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11381fd4702c894fc7fb358f0ecf94c5eaadd38ca2e9bfefec43f4b955e6c0f7.dll,#12⤵PID:4600
-