Analysis
-
max time kernel
187s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 12:56
Static task
static1
Behavioral task
behavioral1
Sample
31a62a4c480d1d124e3c23e6419806a154573381fdc7b9ab6573ac7ea405b139.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
General
-
Target
31a62a4c480d1d124e3c23e6419806a154573381fdc7b9ab6573ac7ea405b139.dll
-
Size
364KB
-
MD5
08f94b7ef14f1afa30170c57e3a604a0
-
SHA1
cf77d2b481e37c8c7393c53c80f652184e6a3259
-
SHA256
31a62a4c480d1d124e3c23e6419806a154573381fdc7b9ab6573ac7ea405b139
-
SHA512
b81d6c5d0dd3ccc3984406c9543e1d12683f3c205a54c7a8ee5d7625f4269468f00939e2aff8b2be2892ca8db5b8de9bdd42121da3d2089b2b806f02196270f5
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0k:jDgtfRQUHPw06MoV2nwTBlhm8c
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5020 wrote to memory of 4136 5020 rundll32.exe 82 PID 5020 wrote to memory of 4136 5020 rundll32.exe 82 PID 5020 wrote to memory of 4136 5020 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31a62a4c480d1d124e3c23e6419806a154573381fdc7b9ab6573ac7ea405b139.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31a62a4c480d1d124e3c23e6419806a154573381fdc7b9ab6573ac7ea405b139.dll,#12⤵PID:4136
-