Analysis
-
max time kernel
96s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
8d7d213369e7af9a01910244ea4f08236c62ed3b815823c86230493f71a2a54a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8d7d213369e7af9a01910244ea4f08236c62ed3b815823c86230493f71a2a54a.dll
Resource
win10v2004-20220812-en
General
-
Target
8d7d213369e7af9a01910244ea4f08236c62ed3b815823c86230493f71a2a54a.dll
-
Size
208KB
-
MD5
2ef06adad256aa742ad6aacd75b3339f
-
SHA1
83d9c22a1afe7bc4a17a2686f036ca9476ba1e56
-
SHA256
8d7d213369e7af9a01910244ea4f08236c62ed3b815823c86230493f71a2a54a
-
SHA512
d1a9af79ceda8b805aa8ba3c33a0c988c42be386c36ed817ac492e052bf3cbeceab60f928e415d977e8473b35d4b225f3b8305056265c7fd353dc8524fa8da39
-
SSDEEP
6144:0PONKLeRrg+wVik20pvJcuBRqYCpw3QEgvcSmuCn:DFgfMk2GcYqYWw3xgcn
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4072 wrote to memory of 4780 4072 rundll32.exe 79 PID 4072 wrote to memory of 4780 4072 rundll32.exe 79 PID 4072 wrote to memory of 4780 4072 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d7d213369e7af9a01910244ea4f08236c62ed3b815823c86230493f71a2a54a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d7d213369e7af9a01910244ea4f08236c62ed3b815823c86230493f71a2a54a.dll,#12⤵PID:4780
-