Analysis
-
max time kernel
166s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 03:32
Static task
static1
Behavioral task
behavioral1
Sample
08d74ba311a1d5616ceb66fef4207d35b3b9c53aec3e7be23759186a01faa392.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
08d74ba311a1d5616ceb66fef4207d35b3b9c53aec3e7be23759186a01faa392.dll
Resource
win10v2004-20221111-en
General
-
Target
08d74ba311a1d5616ceb66fef4207d35b3b9c53aec3e7be23759186a01faa392.dll
-
Size
55KB
-
MD5
2d685daf96ddc789816989af9b372f10
-
SHA1
3dde7a009333fd8e10d5e1dcd773bd9e267da087
-
SHA256
08d74ba311a1d5616ceb66fef4207d35b3b9c53aec3e7be23759186a01faa392
-
SHA512
c145761b9aaf0869d788dd0b26abea68f3f1008a17e63f9b34fe125846bb7a99117743f83a816b8ffe4baee7d897fcfac11373c0a7b2894e3e68ac7d756487f9
-
SSDEEP
768:s3Zgo4wEZwkCjHnNpeM3k/06FKb3/w+dMc44+YZkJoIx/ha5:s3ZD5rNt1PPMcNC
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2252 2196 rundll32.exe 81 PID 2196 wrote to memory of 2252 2196 rundll32.exe 81 PID 2196 wrote to memory of 2252 2196 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08d74ba311a1d5616ceb66fef4207d35b3b9c53aec3e7be23759186a01faa392.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08d74ba311a1d5616ceb66fef4207d35b3b9c53aec3e7be23759186a01faa392.dll,#12⤵PID:2252
-