Analysis
-
max time kernel
74s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
83cdd661b42f5c0af11eff686c8d4d96b7dd832c770796ea38f84bf07f97b35f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83cdd661b42f5c0af11eff686c8d4d96b7dd832c770796ea38f84bf07f97b35f.dll
Resource
win10v2004-20220901-en
General
-
Target
83cdd661b42f5c0af11eff686c8d4d96b7dd832c770796ea38f84bf07f97b35f.dll
-
Size
7KB
-
MD5
79b16c8bda9b1d5b854a2dcfd3a3fb50
-
SHA1
4a6969f8bb233473008343274534f329b7655069
-
SHA256
83cdd661b42f5c0af11eff686c8d4d96b7dd832c770796ea38f84bf07f97b35f
-
SHA512
ce8e1ccef3a98aa27c366f909a716b8b6d1a30ddda2afd4b65b8215c58c543631d1b5bbd1209ff812a09b3df35051d2d352cca69f31df7ea2eb2d76522365bb2
-
SSDEEP
96:z0xgPtJrYmVjGwd+Ub9LQq89Mzp3RVI5PQxn5sfTjt3rS2P:nTiS+EF1pt3RVss5EPt7S2P
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1952 wrote to memory of 3412 1952 rundll32.exe 83 PID 1952 wrote to memory of 3412 1952 rundll32.exe 83 PID 1952 wrote to memory of 3412 1952 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83cdd661b42f5c0af11eff686c8d4d96b7dd832c770796ea38f84bf07f97b35f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83cdd661b42f5c0af11eff686c8d4d96b7dd832c770796ea38f84bf07f97b35f.dll,#12⤵PID:3412
-