Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
a49f2d53a67bcdca738a2d9fb0398d5a4d7296d2a0dacd282ba6473ba3222bef.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a49f2d53a67bcdca738a2d9fb0398d5a4d7296d2a0dacd282ba6473ba3222bef.dll
Resource
win10v2004-20220812-en
General
-
Target
a49f2d53a67bcdca738a2d9fb0398d5a4d7296d2a0dacd282ba6473ba3222bef.dll
-
Size
5KB
-
MD5
4eb689e8ff18d2c48b558ea920e41690
-
SHA1
dfbd548e9e22206cf42da63190e6dc1cb0ad2cf1
-
SHA256
a49f2d53a67bcdca738a2d9fb0398d5a4d7296d2a0dacd282ba6473ba3222bef
-
SHA512
8177c9dc8cf4ea3320561f8d1b37596da4a0f35b3d700ee5372198a76fd2ca8a7b42e8a02c1cd6959f3066bb058fb81664a4590aab480b033069b7c2480a52fe
-
SSDEEP
48:Ss0wYjRDmah965/icI7Tp3srHbezbKsrp4WyOacD8daZyGTE6suJTee8PK0iGt5l:z0B96BLIzE7cD7ZyAEBe8CDKtDP0LLR
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4408 wrote to memory of 2556 4408 rundll32.exe 81 PID 4408 wrote to memory of 2556 4408 rundll32.exe 81 PID 4408 wrote to memory of 2556 4408 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a49f2d53a67bcdca738a2d9fb0398d5a4d7296d2a0dacd282ba6473ba3222bef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a49f2d53a67bcdca738a2d9fb0398d5a4d7296d2a0dacd282ba6473ba3222bef.dll,#12⤵PID:2556
-