Analysis
-
max time kernel
203s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
6c08e0ce62f755346a39deb46f540b151280716c979abdf82037cf0c66034a6d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6c08e0ce62f755346a39deb46f540b151280716c979abdf82037cf0c66034a6d.dll
Resource
win10v2004-20221111-en
General
-
Target
6c08e0ce62f755346a39deb46f540b151280716c979abdf82037cf0c66034a6d.dll
-
Size
42KB
-
MD5
541cf0f5516f35103dbcd174674e324d
-
SHA1
f5767bbc1d791f10cb7e9fcbd620e59a77b29c97
-
SHA256
6c08e0ce62f755346a39deb46f540b151280716c979abdf82037cf0c66034a6d
-
SHA512
ff7fe528ce3f6c64e3d91cb3a863870fbae793420029469e0ce9feb65e694968ea4c1747da46d0cd513deafda287bee2933ac91d62d70a99bfa6fea080ba2e72
-
SSDEEP
768:BPOj819FjalhTxbaUMn/Ka6+aBV93U3VY6Fku0dcyaO1o9Jl:Rk8198llxbavn/KP+ISBkjdzBo
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2468 5048 rundll32.exe 82 PID 5048 wrote to memory of 2468 5048 rundll32.exe 82 PID 5048 wrote to memory of 2468 5048 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6c08e0ce62f755346a39deb46f540b151280716c979abdf82037cf0c66034a6d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6c08e0ce62f755346a39deb46f540b151280716c979abdf82037cf0c66034a6d.dll,#12⤵PID:2468
-