Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
3431038a82a1a633e04212ff848878e34717dcd99ff725da4db5a428126e671f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3431038a82a1a633e04212ff848878e34717dcd99ff725da4db5a428126e671f.dll
Resource
win10v2004-20220901-en
General
-
Target
3431038a82a1a633e04212ff848878e34717dcd99ff725da4db5a428126e671f.dll
-
Size
92KB
-
MD5
9408415c87170079876f5b4a2d50ea8d
-
SHA1
2477e396894b4eb1a74ceb38a3cc26952788694e
-
SHA256
3431038a82a1a633e04212ff848878e34717dcd99ff725da4db5a428126e671f
-
SHA512
dad98efc955c9787a292459d840310714eb8bda95297a76121c8a40a0f7181f950d0986d008b543ce9ead931c42da7b1c47dbb6b5e6adaad0a7947b4f2316793
-
SSDEEP
1536:Ys/vYYK0BeKCP5uZ1qyCK2MTCOKAgSeHVpJsm3QDN0LS/lAxHuxd:3nVKp5uZQK2kKAg5H/JsmDLSyUD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4972 4868 rundll32.exe 81 PID 4868 wrote to memory of 4972 4868 rundll32.exe 81 PID 4868 wrote to memory of 4972 4868 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3431038a82a1a633e04212ff848878e34717dcd99ff725da4db5a428126e671f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3431038a82a1a633e04212ff848878e34717dcd99ff725da4db5a428126e671f.dll,#12⤵PID:4972
-