Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
6c34df8d57b5a29fa0414aec9f2027350afacd92520e2d139205a61cbf653b92.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6c34df8d57b5a29fa0414aec9f2027350afacd92520e2d139205a61cbf653b92.dll
Resource
win10v2004-20220901-en
General
-
Target
6c34df8d57b5a29fa0414aec9f2027350afacd92520e2d139205a61cbf653b92.dll
-
Size
6KB
-
MD5
4cb778f3191160cb017846297b49dfc0
-
SHA1
76e8a404df4cad18acb4ad531e34c23cf156a602
-
SHA256
6c34df8d57b5a29fa0414aec9f2027350afacd92520e2d139205a61cbf653b92
-
SHA512
6783c772d8d74b361322365813785abec3092cf6d03ac1c38e4ebcf589d43b708f7facc3b106f092d8a28af9037cade3fb600b43da2af8d9f07b43bf0fef7776
-
SSDEEP
96:Ts1Wnnnynnnnnnnn6nnann7nnXnnbnnKniROXaArumy+pi7qfYujiQWABxm:YXkaAyx+IP/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4940 4396 rundll32.exe 80 PID 4396 wrote to memory of 4940 4396 rundll32.exe 80 PID 4396 wrote to memory of 4940 4396 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6c34df8d57b5a29fa0414aec9f2027350afacd92520e2d139205a61cbf653b92.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6c34df8d57b5a29fa0414aec9f2027350afacd92520e2d139205a61cbf653b92.dll,#12⤵PID:4940
-