Analysis
-
max time kernel
149s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 04:54
Static task
static1
Behavioral task
behavioral1
Sample
70fcd2a95a9a5c92900fb8ce1ef3457fca1e7a0304f3f8ffb12a1095c10dac58.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
70fcd2a95a9a5c92900fb8ce1ef3457fca1e7a0304f3f8ffb12a1095c10dac58.dll
Resource
win10v2004-20220812-en
General
-
Target
70fcd2a95a9a5c92900fb8ce1ef3457fca1e7a0304f3f8ffb12a1095c10dac58.dll
-
Size
8KB
-
MD5
f555b58372596adaa47e8255b243dd60
-
SHA1
422ccbf8a5a70dd847b95187f406f6deb88dea0e
-
SHA256
70fcd2a95a9a5c92900fb8ce1ef3457fca1e7a0304f3f8ffb12a1095c10dac58
-
SHA512
b2ba8a48d8b139c54296ce8dd6447080f8d5cb44099fa069af5e1ad5215e4e0682e02c569c28ed6447209c5db7c18e1210f9f5a2a2470d1ee871471efd94b3fa
-
SSDEEP
96:z0/gPtJrYmVjGwd+8blPDDDDDDDDEZSHGUC4puqA10a+36G+vXGBluO2:FTiS+siZ6GupuqA6L3R+vwuO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4076 4740 rundll32.exe 79 PID 4740 wrote to memory of 4076 4740 rundll32.exe 79 PID 4740 wrote to memory of 4076 4740 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\70fcd2a95a9a5c92900fb8ce1ef3457fca1e7a0304f3f8ffb12a1095c10dac58.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\70fcd2a95a9a5c92900fb8ce1ef3457fca1e7a0304f3f8ffb12a1095c10dac58.dll,#12⤵PID:4076
-