Analysis
-
max time kernel
167s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
8b969c26737cdd83f269ae70ceb95c6ebf1ef0ea58a01efa972b4eba116a99bd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8b969c26737cdd83f269ae70ceb95c6ebf1ef0ea58a01efa972b4eba116a99bd.dll
Resource
win10v2004-20221111-en
General
-
Target
8b969c26737cdd83f269ae70ceb95c6ebf1ef0ea58a01efa972b4eba116a99bd.dll
-
Size
33KB
-
MD5
f59d9a1404d3b5bff69ab03c0f944810
-
SHA1
ddd016c83e3dbd753d8791f4a9c00673d5981f93
-
SHA256
8b969c26737cdd83f269ae70ceb95c6ebf1ef0ea58a01efa972b4eba116a99bd
-
SHA512
739482fb137ee0e1dc7f8564853f656702fa56a5b4936c2fd9b954da214b213d69d5b04b125e2e199f424e456cad65376d10b63eb9151bb024eb3f44e0074623
-
SSDEEP
768:7Sn1bTS2JZHNZCyxpzm7N6X7Lfdhh5hcD/4s+pR3zS2TkET:7Sn1bTSypSu7LFhzC8s+pRjIY
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 456 wrote to memory of 4740 456 rundll32.exe 82 PID 456 wrote to memory of 4740 456 rundll32.exe 82 PID 456 wrote to memory of 4740 456 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b969c26737cdd83f269ae70ceb95c6ebf1ef0ea58a01efa972b4eba116a99bd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b969c26737cdd83f269ae70ceb95c6ebf1ef0ea58a01efa972b4eba116a99bd.dll,#12⤵PID:4740
-