Analysis
-
max time kernel
72s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 04:37
Static task
static1
Behavioral task
behavioral1
Sample
d06931a69a02b203872198bbccdc0ef3c6b1be34c485877dead39caa92e25878.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d06931a69a02b203872198bbccdc0ef3c6b1be34c485877dead39caa92e25878.dll
Resource
win10v2004-20220901-en
General
-
Target
d06931a69a02b203872198bbccdc0ef3c6b1be34c485877dead39caa92e25878.dll
-
Size
4KB
-
MD5
c70bac4be11fa6b072d385df5d3a3ae0
-
SHA1
d402a0a95e0c9b264bff06e495e0b741da6cb6e8
-
SHA256
d06931a69a02b203872198bbccdc0ef3c6b1be34c485877dead39caa92e25878
-
SHA512
a13cab85b9bcd18f8d20d6ffcce7860202eaea83511c0d45dc68628529e7e699761894321ebc67ca3f8e832b9c8e4a2ccd6d060a9f3e05cfc4c45cc66eaa8266
-
SSDEEP
48:a5zdM1cSTBg0r27vTuAEKrGdoujby2DJNSQ9i+78NNKkAa/IX/qo:PT3r2vu9eGtjnDJEQYNXAa/I/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1972 1952 rundll32.exe 84 PID 1952 wrote to memory of 1972 1952 rundll32.exe 84 PID 1952 wrote to memory of 1972 1952 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d06931a69a02b203872198bbccdc0ef3c6b1be34c485877dead39caa92e25878.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d06931a69a02b203872198bbccdc0ef3c6b1be34c485877dead39caa92e25878.dll,#12⤵PID:1972
-