Analysis
-
max time kernel
221s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
513a73d6fef94415e4ad95d93709577af0ffcf34d9f9ffb573a4a61037ee1730.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
513a73d6fef94415e4ad95d93709577af0ffcf34d9f9ffb573a4a61037ee1730.dll
Resource
win10v2004-20221111-en
General
-
Target
513a73d6fef94415e4ad95d93709577af0ffcf34d9f9ffb573a4a61037ee1730.dll
-
Size
6KB
-
MD5
9c2dee3eb13b63c720fc3b32f27620a0
-
SHA1
a6b0a4146684527adc899c1a255361ede9a8c858
-
SHA256
513a73d6fef94415e4ad95d93709577af0ffcf34d9f9ffb573a4a61037ee1730
-
SHA512
66c4f4b3565a8326ac577e39e36b3970bc3a5e1ebce447bc1d58952513bafaa4b54dc766c5454da30224678e98a8ce065a81c0670e918c6e7b4e5e6a2691f6ca
-
SSDEEP
96:nEY2RrF1eqwi4yf0oYEzNu2EJnzYTySf/w+ooNCkorul2b3A:EHRh1eppyfMEz02cnSw+IL3A
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1904 wrote to memory of 424 1904 rundll32.exe 81 PID 1904 wrote to memory of 424 1904 rundll32.exe 81 PID 1904 wrote to memory of 424 1904 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\513a73d6fef94415e4ad95d93709577af0ffcf34d9f9ffb573a4a61037ee1730.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\513a73d6fef94415e4ad95d93709577af0ffcf34d9f9ffb573a4a61037ee1730.dll,#12⤵PID:424
-