Analysis
-
max time kernel
301s -
max time network
364s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 04:43
Static task
static1
Behavioral task
behavioral1
Sample
a9eed261e15c436ec4b81237e76067c2817e9deeb1eda62db7a628e3400452e8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9eed261e15c436ec4b81237e76067c2817e9deeb1eda62db7a628e3400452e8.dll
Resource
win10v2004-20221111-en
General
-
Target
a9eed261e15c436ec4b81237e76067c2817e9deeb1eda62db7a628e3400452e8.dll
-
Size
4KB
-
MD5
992e17d3731cf080b33db4a8160e2e10
-
SHA1
39d3a8e458b55e5316b9246a2f070a6676c3aea3
-
SHA256
a9eed261e15c436ec4b81237e76067c2817e9deeb1eda62db7a628e3400452e8
-
SHA512
ce35f167e0ec7b13dac55136c061aafde58d1e399eb78edd930e2f7bc83663915539ba3b919794023354ad2536d9afec603364dde9ece9e7b5b3e3eb8b8084ec
-
SSDEEP
48:a7Q2voyT+Bt5a9CEIJmpqqt0OwX0NZFh84oVXdudoXaZJSEVj:qT+ZKCEIcIqtkENZFQYnVR
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4368 wrote to memory of 2052 4368 rundll32.exe 81 PID 4368 wrote to memory of 2052 4368 rundll32.exe 81 PID 4368 wrote to memory of 2052 4368 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a9eed261e15c436ec4b81237e76067c2817e9deeb1eda62db7a628e3400452e8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a9eed261e15c436ec4b81237e76067c2817e9deeb1eda62db7a628e3400452e8.dll,#12⤵PID:2052
-