Analysis
-
max time kernel
171s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
695814892f4a8b4873b53bde4e9f23a05466c670e6407fb4b3d8e50e93de412f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
695814892f4a8b4873b53bde4e9f23a05466c670e6407fb4b3d8e50e93de412f.dll
Resource
win10v2004-20221111-en
General
-
Target
695814892f4a8b4873b53bde4e9f23a05466c670e6407fb4b3d8e50e93de412f.dll
-
Size
4KB
-
MD5
122599ddf1075976813c22a0585bdaf0
-
SHA1
cb6f1849bf1919de304aa6757a7cf09d38213a99
-
SHA256
695814892f4a8b4873b53bde4e9f23a05466c670e6407fb4b3d8e50e93de412f
-
SHA512
446681728570564d4e30332b12ee6541e8bb96c33a39ac0753bbcde570d651fed69c7562c90567f36c6129f190ff79235d8b92c9c7bf4499f144fbdc8a3db55e
-
SSDEEP
48:qHupGeMcCB96DrhWHR0FiIsipZlM+u+eAPMDQHpyuLv6omwxmUB+jMf7X:PMXB0rw0MI/pwbdQL7X
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2112 2680 rundll32.exe 82 PID 2680 wrote to memory of 2112 2680 rundll32.exe 82 PID 2680 wrote to memory of 2112 2680 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\695814892f4a8b4873b53bde4e9f23a05466c670e6407fb4b3d8e50e93de412f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\695814892f4a8b4873b53bde4e9f23a05466c670e6407fb4b3d8e50e93de412f.dll,#12⤵PID:2112
-