Analysis
-
max time kernel
147s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
2479dd973dd0b80fcbf46baedb2a91fdb5519b6e8c0e2b104a761797c04768b4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2479dd973dd0b80fcbf46baedb2a91fdb5519b6e8c0e2b104a761797c04768b4.dll
Resource
win10v2004-20220812-en
General
-
Target
2479dd973dd0b80fcbf46baedb2a91fdb5519b6e8c0e2b104a761797c04768b4.dll
-
Size
6KB
-
MD5
0e0a1eb37328b09410aae67aaa0b3060
-
SHA1
80d036695a48377fd8bacf88551089a0e842df61
-
SHA256
2479dd973dd0b80fcbf46baedb2a91fdb5519b6e8c0e2b104a761797c04768b4
-
SHA512
d23945912f624383207441abcf15265c693e29d4344820fd3df4902349bcfb76d3db9e1a1cb7070c48184e0f95167067a2fb9cf77ed80b2d72605652d21b8111
-
SSDEEP
192:oEkQV4Lf+A+A+WA+A+S++U++U++d+A+A+A+AW+A+AU++U++U+4+A+A+UA++U++U1:oiV4Lf+A+A+WA+A+S++U++U++d+A+A+5
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3836 wrote to memory of 2128 3836 rundll32.exe 79 PID 3836 wrote to memory of 2128 3836 rundll32.exe 79 PID 3836 wrote to memory of 2128 3836 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2479dd973dd0b80fcbf46baedb2a91fdb5519b6e8c0e2b104a761797c04768b4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2479dd973dd0b80fcbf46baedb2a91fdb5519b6e8c0e2b104a761797c04768b4.dll,#12⤵PID:2128
-