Analysis
-
max time kernel
152s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
593121e79409bd4c69be13c7433d4e16976b9c7eed89aca1979c5f20052efa49.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
593121e79409bd4c69be13c7433d4e16976b9c7eed89aca1979c5f20052efa49.dll
Resource
win10v2004-20221111-en
General
-
Target
593121e79409bd4c69be13c7433d4e16976b9c7eed89aca1979c5f20052efa49.dll
-
Size
9KB
-
MD5
b79ee44348db0274006e9c6bfb5177b0
-
SHA1
9521bc02d6e25dd2104b5cc4ffd6de2887819623
-
SHA256
593121e79409bd4c69be13c7433d4e16976b9c7eed89aca1979c5f20052efa49
-
SHA512
a2bd15f771c27fb55dbeb10d959cc5bfdcce9bcd6d6bd4e12ff2e12b94d720528a842ab0c63c758eff18006fad253bfe29d7444d4fdeb502d4628b91a1ea038a
-
SSDEEP
192:Enekfu3hME1hMEuCv/ENbSrbFzCcyssPPP7eDPHnx7I0cGsx:EneCMhME1hMEuCv/ENbSF9yDzebHx7ne
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1432 wrote to memory of 3428 1432 rundll32.exe 83 PID 1432 wrote to memory of 3428 1432 rundll32.exe 83 PID 1432 wrote to memory of 3428 1432 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\593121e79409bd4c69be13c7433d4e16976b9c7eed89aca1979c5f20052efa49.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\593121e79409bd4c69be13c7433d4e16976b9c7eed89aca1979c5f20052efa49.dll,#12⤵PID:3428
-