Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
17f80404ca6b3deb88ef62d6b05bb20e468cace171d14f217d1ce97ded8eb80f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17f80404ca6b3deb88ef62d6b05bb20e468cace171d14f217d1ce97ded8eb80f.dll
Resource
win10v2004-20220812-en
General
-
Target
17f80404ca6b3deb88ef62d6b05bb20e468cace171d14f217d1ce97ded8eb80f.dll
-
Size
59KB
-
MD5
10dbe27f334b1906a8f78da176d9a320
-
SHA1
fce43e899023954d871d0ed507f0b4aaad93166f
-
SHA256
17f80404ca6b3deb88ef62d6b05bb20e468cace171d14f217d1ce97ded8eb80f
-
SHA512
bc31cb06b95375782c6043a5ffad6e991e28c9ae98a8568de0f02c1fc154b5080efdceb084c7085078b8c4ca64a46b672ceab65fd9936178114e057fe070933a
-
SSDEEP
1536:BfQAl+7ovOg+JRzMUljsWz6nMIyIIDYvfT2/YA8TK1H/0u:dQAl+pg+JRzI+aMIbvfTmhcu
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1564 1168 rundll32.exe 79 PID 1168 wrote to memory of 1564 1168 rundll32.exe 79 PID 1168 wrote to memory of 1564 1168 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17f80404ca6b3deb88ef62d6b05bb20e468cace171d14f217d1ce97ded8eb80f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17f80404ca6b3deb88ef62d6b05bb20e468cace171d14f217d1ce97ded8eb80f.dll,#12⤵PID:1564
-