Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 05:08
Static task
static1
Behavioral task
behavioral1
Sample
22a63c17731aab40abf25e050e26881b5db569ea440e489713db90ca63dfa244.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
22a63c17731aab40abf25e050e26881b5db569ea440e489713db90ca63dfa244.dll
Resource
win10v2004-20220812-en
General
-
Target
22a63c17731aab40abf25e050e26881b5db569ea440e489713db90ca63dfa244.dll
-
Size
5KB
-
MD5
28cc1031b06f2f512154a19ab53439e0
-
SHA1
585a2b5f2fbf53c3961a65050fc87f23281f0ff7
-
SHA256
22a63c17731aab40abf25e050e26881b5db569ea440e489713db90ca63dfa244
-
SHA512
d28aa168876bb44755010ebc6f93b8384d65d215efe28553a2b2644fb23410262e65daee9994efdca4cc11aeff1e8195d69bc58ccd7a27831182c438ad371f62
-
SSDEEP
48:a7Q2voyT+Bt5a9jzk98YpdUHV5pEXnyT+qwyIjprgEBn5W/u6JYR8reA:qT+ZKjzIzq3bAkgnw/u6JI8reA
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4732 4832 rundll32.exe 79 PID 4832 wrote to memory of 4732 4832 rundll32.exe 79 PID 4832 wrote to memory of 4732 4832 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22a63c17731aab40abf25e050e26881b5db569ea440e489713db90ca63dfa244.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22a63c17731aab40abf25e050e26881b5db569ea440e489713db90ca63dfa244.dll,#12⤵PID:4732
-