Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
5bce1e437c898a9c3800dcd1a1b0af779d0c281cc19c9f67f10963c53a350e11.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5bce1e437c898a9c3800dcd1a1b0af779d0c281cc19c9f67f10963c53a350e11.dll
Resource
win10v2004-20220812-en
General
-
Target
5bce1e437c898a9c3800dcd1a1b0af779d0c281cc19c9f67f10963c53a350e11.dll
-
Size
4KB
-
MD5
94d053e0626d3448a03a26bb5cb8e9e0
-
SHA1
da575ca1e2666611eb3cfd32fd5a0c6833da7f07
-
SHA256
5bce1e437c898a9c3800dcd1a1b0af779d0c281cc19c9f67f10963c53a350e11
-
SHA512
70b4fc389cdc82aface5e1d91e174a0f19a1023a13a9e68019d6e7afbc9db0286ae402dbcbf246e4b48f28c46c9d9c269a760240952c7a3bb8c7c9dd881aacc7
-
SSDEEP
48:qHupGeMcCB96DrhWHR0FiIsipZlM+u+eAPMDQHpyuLv6om79bpq0e:PMXB0rw0MI/pwbdRNe
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2088 wrote to memory of 676 2088 rundll32.exe 81 PID 2088 wrote to memory of 676 2088 rundll32.exe 81 PID 2088 wrote to memory of 676 2088 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5bce1e437c898a9c3800dcd1a1b0af779d0c281cc19c9f67f10963c53a350e11.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5bce1e437c898a9c3800dcd1a1b0af779d0c281cc19c9f67f10963c53a350e11.dll,#12⤵PID:676
-