Analysis
-
max time kernel
130s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 04:31
Static task
static1
Behavioral task
behavioral1
Sample
f61c48efeae73c6241afe317d296001fa390307f9472264fd7f66d20e043738a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f61c48efeae73c6241afe317d296001fa390307f9472264fd7f66d20e043738a.dll
Resource
win10v2004-20220812-en
General
-
Target
f61c48efeae73c6241afe317d296001fa390307f9472264fd7f66d20e043738a.dll
-
Size
6KB
-
MD5
34c2c03ef04920e8c37d60fb6b4f1180
-
SHA1
e32f823616225df33aa04d0141e2ac833cba3a17
-
SHA256
f61c48efeae73c6241afe317d296001fa390307f9472264fd7f66d20e043738a
-
SHA512
faa9dc120f7f29381912deea5857469cb0a09986b66d8dbd5357f9688f8b23f1296af60dcfbf8c0072bfe6f6c85de314753e3044180758d815c1c16c715f40b6
-
SSDEEP
96:DixZjmjtjd8jPjcZGR5TIA3imTAb26B0Dq4MI9jtcxA6ff/ti:unSR6bgY73fTa264jNjtQH/ti
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3160 wrote to memory of 4720 3160 rundll32.exe 79 PID 3160 wrote to memory of 4720 3160 rundll32.exe 79 PID 3160 wrote to memory of 4720 3160 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f61c48efeae73c6241afe317d296001fa390307f9472264fd7f66d20e043738a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f61c48efeae73c6241afe317d296001fa390307f9472264fd7f66d20e043738a.dll,#12⤵PID:4720
-