Analysis
-
max time kernel
249s -
max time network
272s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
ca457bcdfc6fb6dd038b72ea2307b1d8147c0f4a83f90dc38b38da471cd50929.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca457bcdfc6fb6dd038b72ea2307b1d8147c0f4a83f90dc38b38da471cd50929.dll
Resource
win10v2004-20221111-en
General
-
Target
ca457bcdfc6fb6dd038b72ea2307b1d8147c0f4a83f90dc38b38da471cd50929.dll
-
Size
48KB
-
MD5
47c2d556b337878521028afd2cbe7634
-
SHA1
55a81df4849f7bf2837c4e017f7b1a74b6e817b7
-
SHA256
ca457bcdfc6fb6dd038b72ea2307b1d8147c0f4a83f90dc38b38da471cd50929
-
SHA512
70ffa8d5a7d54a7081b101ed3cb8b866722f6794eb16bced66a2f78c657eb6b6ac52047fada08e42cbc83e62107fee31ceea1ea779cdf894500ae2cdeabd3d69
-
SSDEEP
768:bJpJAThLRCzY/ITt8DAiHbMhtnDKloXh3KKDEL:/JAThLss/Oj/2oRvDEL
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dr188at.ini rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3408 wrote to memory of 1320 3408 rundll32.exe 80 PID 3408 wrote to memory of 1320 3408 rundll32.exe 80 PID 3408 wrote to memory of 1320 3408 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca457bcdfc6fb6dd038b72ea2307b1d8147c0f4a83f90dc38b38da471cd50929.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca457bcdfc6fb6dd038b72ea2307b1d8147c0f4a83f90dc38b38da471cd50929.dll,#12⤵
- Drops file in System32 directory
PID:1320
-