Analysis
-
max time kernel
161s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 08:39
Static task
static1
Behavioral task
behavioral1
Sample
60764fa5eb79571cdf54c42e1b2f12e7ee96186fab7b51c63cac11b55d936a4c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
60764fa5eb79571cdf54c42e1b2f12e7ee96186fab7b51c63cac11b55d936a4c.dll
Resource
win10v2004-20221111-en
General
-
Target
60764fa5eb79571cdf54c42e1b2f12e7ee96186fab7b51c63cac11b55d936a4c.dll
-
Size
604KB
-
MD5
4dc9fac124b9cde37c980fa0ba2cd660
-
SHA1
cb9d9f99a90c941c014e0e5c4b3d53d5c10c8625
-
SHA256
60764fa5eb79571cdf54c42e1b2f12e7ee96186fab7b51c63cac11b55d936a4c
-
SHA512
717783aa74d8d52e8b14ebca3b221aac719606603a5a2270177f898e57caff9e4bc71196ac89133fe3fdb559e71297a894281f42d207969b4dd72600ca2f971a
-
SSDEEP
12288:3CqrU4AOfzSjWf41BfeeY8oZF9B1f7ACAJoTL4SDcxC5T2y:Lw4AObSCfUAeh4f7EJeRDP12y
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1424 2988 rundll32.exe 85 PID 2988 wrote to memory of 1424 2988 rundll32.exe 85 PID 2988 wrote to memory of 1424 2988 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60764fa5eb79571cdf54c42e1b2f12e7ee96186fab7b51c63cac11b55d936a4c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60764fa5eb79571cdf54c42e1b2f12e7ee96186fab7b51c63cac11b55d936a4c.dll,#12⤵PID:1424
-