Analysis
-
max time kernel
237s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
f1ff74a68417376e58e6d414216a31eddf6e701995b5b6de0525b0b26b2c0fb0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1ff74a68417376e58e6d414216a31eddf6e701995b5b6de0525b0b26b2c0fb0.dll
Resource
win10v2004-20221111-en
General
-
Target
f1ff74a68417376e58e6d414216a31eddf6e701995b5b6de0525b0b26b2c0fb0.dll
-
Size
6KB
-
MD5
e35b0589e9d1187e3b0146bd5d917190
-
SHA1
05f2bd39fb0d00c660c032c8bd15a3d084325109
-
SHA256
f1ff74a68417376e58e6d414216a31eddf6e701995b5b6de0525b0b26b2c0fb0
-
SHA512
5765e0a405fc65fcc8e2cef140827d6547a53e6fcfca265c3cdffb865d557d512c55a13c0fee107cde95a4ae986a68c35c2c6083d5c38c82c2f00221356dbbdf
-
SSDEEP
96:nEY2RrF1eqwi415bb0MXOUpVb++Bi+uCPc0Cun8A9U4a:EHRh1eppXbb3OU2+BlP
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4440 4344 rundll32.exe 81 PID 4344 wrote to memory of 4440 4344 rundll32.exe 81 PID 4344 wrote to memory of 4440 4344 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1ff74a68417376e58e6d414216a31eddf6e701995b5b6de0525b0b26b2c0fb0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1ff74a68417376e58e6d414216a31eddf6e701995b5b6de0525b0b26b2c0fb0.dll,#12⤵PID:4440
-