Analysis
-
max time kernel
290s -
max time network
325s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 18:55
Static task
static1
Behavioral task
behavioral1
Sample
d62c9f0ed8eca6e6fdbfee28cd790084bbca2b3f2fa46bd416b0cfbb9a883b77.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d62c9f0ed8eca6e6fdbfee28cd790084bbca2b3f2fa46bd416b0cfbb9a883b77.dll
Resource
win10v2004-20221111-en
General
-
Target
d62c9f0ed8eca6e6fdbfee28cd790084bbca2b3f2fa46bd416b0cfbb9a883b77.dll
-
Size
49KB
-
MD5
b8b6eca57f6a09e56bb5d95f00fa71a8
-
SHA1
4bc2cb6d5cf8dd5de1d99ed8e0da1658b41b5da0
-
SHA256
d62c9f0ed8eca6e6fdbfee28cd790084bbca2b3f2fa46bd416b0cfbb9a883b77
-
SHA512
b04440fba53786653e82500ff1e12059af9c1eee7a91dccfa5fc1f37fda17c247df4e131f25d025aa573763a676f2f67691ebe27c1a48b730d170b2cd3c342d8
-
SSDEEP
768:Mq5dPwMoCTnxQkE6rJWcZQr6BofkQOgwoM7bGYdfRNhX2:FdT/jxQkE6rEWYkQORFbGqdX2
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 920 wrote to memory of 3776 920 rundll32.exe 80 PID 920 wrote to memory of 3776 920 rundll32.exe 80 PID 920 wrote to memory of 3776 920 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d62c9f0ed8eca6e6fdbfee28cd790084bbca2b3f2fa46bd416b0cfbb9a883b77.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d62c9f0ed8eca6e6fdbfee28cd790084bbca2b3f2fa46bd416b0cfbb9a883b77.dll,#12⤵PID:3776
-