Analysis
-
max time kernel
235s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
1bf285b436f7d1f97f94a5ba2db84235a99baaf0a770e1ce66e130ccd218885e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1bf285b436f7d1f97f94a5ba2db84235a99baaf0a770e1ce66e130ccd218885e.dll
Resource
win10v2004-20221111-en
General
-
Target
1bf285b436f7d1f97f94a5ba2db84235a99baaf0a770e1ce66e130ccd218885e.dll
-
Size
152KB
-
MD5
7f5b36f875c1258969d0681999170914
-
SHA1
3d803192a239ab3e7b4151adbd64764c1da8fabd
-
SHA256
1bf285b436f7d1f97f94a5ba2db84235a99baaf0a770e1ce66e130ccd218885e
-
SHA512
9e9cf2fb820f4e817b16772d07ebc2c46808c46884e79d2e6ddbb73bfb80833601e1d81bba85f6423c9dc96f49793ec6b79a8b86a81a28571873ed461f8ec8a4
-
SSDEEP
3072:WQw5JTr9QnNTYQx4NZVwHTZAZ+dsO8N+OMF7oeSBL:fcd92RMVgT4Y8N+OGTSB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 1988 4944 rundll32.exe 81 PID 4944 wrote to memory of 1988 4944 rundll32.exe 81 PID 4944 wrote to memory of 1988 4944 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1bf285b436f7d1f97f94a5ba2db84235a99baaf0a770e1ce66e130ccd218885e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1bf285b436f7d1f97f94a5ba2db84235a99baaf0a770e1ce66e130ccd218885e.dll,#12⤵PID:1988
-