Analysis
-
max time kernel
243s -
max time network
283s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
5e69b97acf4fe2b9d2778b45a4ae26b82b79a98088b6575380fea5cf813d7684.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5e69b97acf4fe2b9d2778b45a4ae26b82b79a98088b6575380fea5cf813d7684.dll
Resource
win10v2004-20221111-en
General
-
Target
5e69b97acf4fe2b9d2778b45a4ae26b82b79a98088b6575380fea5cf813d7684.dll
-
Size
128KB
-
MD5
1a6e062d6bf56d209128ee47c40fbe2b
-
SHA1
9eab80ad73869bc27ec632a21ae82f027aab2d51
-
SHA256
5e69b97acf4fe2b9d2778b45a4ae26b82b79a98088b6575380fea5cf813d7684
-
SHA512
904383b5abd9037b215c34eb35f569133527218f7ca56fac0c6405c1296c89d5a411c7414c76a6c484d451103425bf187e1a276e87ef75092e82af1b441aae21
-
SSDEEP
3072:cHLwUoqYE0vTHowA+XaLyl6QZe5wAG3kLLbVLWlk+JZ:GwHE07HTPZee13kL3VLWll
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4600 wrote to memory of 3740 4600 rundll32.exe 80 PID 4600 wrote to memory of 3740 4600 rundll32.exe 80 PID 4600 wrote to memory of 3740 4600 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e69b97acf4fe2b9d2778b45a4ae26b82b79a98088b6575380fea5cf813d7684.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e69b97acf4fe2b9d2778b45a4ae26b82b79a98088b6575380fea5cf813d7684.dll,#12⤵PID:3740
-