Analysis
-
max time kernel
186s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
88ef291c6c5d4ccb88edcc70a8fe7816395096476e385e071e62a8dd26d1f555.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
88ef291c6c5d4ccb88edcc70a8fe7816395096476e385e071e62a8dd26d1f555.dll
Resource
win10v2004-20221111-en
General
-
Target
88ef291c6c5d4ccb88edcc70a8fe7816395096476e385e071e62a8dd26d1f555.dll
-
Size
184KB
-
MD5
bc63d361806b0fd8567f9f5f5dd400fd
-
SHA1
8919006941a02902a66cb83dc97c890a9012fe45
-
SHA256
88ef291c6c5d4ccb88edcc70a8fe7816395096476e385e071e62a8dd26d1f555
-
SHA512
4c10f6ada3cc50479d3cb7b6a2ad95c9f8dfec5a569c77974fc1b4bcf78ae640ae33d72fe2cde24b72ef9e1f7c033b8845bbe14b5dc2157032dc441254ea1720
-
SSDEEP
3072:PYc4Vl2J0PjGJnPjI6KlUNtmkiHsktfB3/iZydxKJlJlJVK9:w5LjFfotGnh/iZGwxU
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4216 wrote to memory of 212 4216 rundll32.exe 84 PID 4216 wrote to memory of 212 4216 rundll32.exe 84 PID 4216 wrote to memory of 212 4216 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88ef291c6c5d4ccb88edcc70a8fe7816395096476e385e071e62a8dd26d1f555.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88ef291c6c5d4ccb88edcc70a8fe7816395096476e385e071e62a8dd26d1f555.dll,#12⤵PID:212
-