Analysis
-
max time kernel
91s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
9e1d86a26fe0c06a11f3e88d8fb30d46b25bea41a18f001b8a17d76e6192161a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9e1d86a26fe0c06a11f3e88d8fb30d46b25bea41a18f001b8a17d76e6192161a.dll
Resource
win10v2004-20220901-en
General
-
Target
9e1d86a26fe0c06a11f3e88d8fb30d46b25bea41a18f001b8a17d76e6192161a.dll
-
Size
152KB
-
MD5
da7b3df5ef411dec137a25c474d74930
-
SHA1
1ec9797962c3f806c9e426396e7be99ac530a971
-
SHA256
9e1d86a26fe0c06a11f3e88d8fb30d46b25bea41a18f001b8a17d76e6192161a
-
SHA512
7e0b29ca56ffa9ebc152ad14f025ea0232fba3223a64db94b35278a2dc2eb9bf552de226f0103a5d0bd993cc8b7b7dde0b64fd65952e018a4bcf3325eb9e7e63
-
SSDEEP
3072:/NO7mhLVKID2rSNh++aAxgJsMNLk5nXOPlNF50ZMPw5Xtz765E:F9VKgeSnhx5qwxOPDPst65
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4804 4572 rundll32.exe 81 PID 4572 wrote to memory of 4804 4572 rundll32.exe 81 PID 4572 wrote to memory of 4804 4572 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e1d86a26fe0c06a11f3e88d8fb30d46b25bea41a18f001b8a17d76e6192161a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e1d86a26fe0c06a11f3e88d8fb30d46b25bea41a18f001b8a17d76e6192161a.dll,#12⤵PID:4804
-