Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
7fe142a3f22b999e1c3d5858b633fe77e9e3c19bc2364fe75e0c66864d37cc53.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7fe142a3f22b999e1c3d5858b633fe77e9e3c19bc2364fe75e0c66864d37cc53.dll
Resource
win10v2004-20220812-en
General
-
Target
7fe142a3f22b999e1c3d5858b633fe77e9e3c19bc2364fe75e0c66864d37cc53.dll
-
Size
371KB
-
MD5
248a9c0b5e5eb218ece71cfbb3325480
-
SHA1
eaa0c391afc80567059fc01d1ab9cd786c10f41c
-
SHA256
7fe142a3f22b999e1c3d5858b633fe77e9e3c19bc2364fe75e0c66864d37cc53
-
SHA512
f038ed18fc90429f105053396b0c6db49c9a280197b60a388b572c5153ab3fa346365f6872e89733d2ff20a5c9567ef75c055f0bf8f89f234efa46637fa5e64d
-
SSDEEP
6144:e7j0G1gTiJZIscGoLEr9juVtfxB0R4yPPUK7z8PKqbGj5DuK7vFfTXO3yRSw4NiI:eH0/OJVOEpKzb0RpKPKqquK75XO3M0iI
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4928 4864 rundll32.exe 81 PID 4864 wrote to memory of 4928 4864 rundll32.exe 81 PID 4864 wrote to memory of 4928 4864 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7fe142a3f22b999e1c3d5858b633fe77e9e3c19bc2364fe75e0c66864d37cc53.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7fe142a3f22b999e1c3d5858b633fe77e9e3c19bc2364fe75e0c66864d37cc53.dll,#12⤵PID:4928
-