Analysis
-
max time kernel
184s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 12:55
Static task
static1
Behavioral task
behavioral1
Sample
49c7c6914243ce2615f3a360a501efee92bc65653a18498f32c6a83c10831a3e.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
General
-
Target
49c7c6914243ce2615f3a360a501efee92bc65653a18498f32c6a83c10831a3e.dll
-
Size
309KB
-
MD5
edc236c595a5c76ead85eff84ba2bbb0
-
SHA1
cc13d25779817bd404a906bae86ffde1e7975bbe
-
SHA256
49c7c6914243ce2615f3a360a501efee92bc65653a18498f32c6a83c10831a3e
-
SHA512
71e1a2c24e7a402fb43f949c4ff33e5b36a215601e19e6cd6909a036e7f2884b532651cdd5a434bb9883cb17f1aa233ca0cb4fd27a574d00c6d99238b4b3538e
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0S:jDgtfRQUHPw06MoV2nwTBlhm8K
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1936 wrote to memory of 3040 1936 rundll32.exe 81 PID 1936 wrote to memory of 3040 1936 rundll32.exe 81 PID 1936 wrote to memory of 3040 1936 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\49c7c6914243ce2615f3a360a501efee92bc65653a18498f32c6a83c10831a3e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\49c7c6914243ce2615f3a360a501efee92bc65653a18498f32c6a83c10831a3e.dll,#12⤵PID:3040
-