Analysis
-
max time kernel
32s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 12:56
Static task
static1
Behavioral task
behavioral1
Sample
11dfdc2c94b4fd29b3abdd0e59548279773ca591e6ee989515a58532758de2a8.dll
Resource
win7-20220901-en
windows7-x64
2 signatures
150 seconds
General
-
Target
11dfdc2c94b4fd29b3abdd0e59548279773ca591e6ee989515a58532758de2a8.dll
-
Size
231KB
-
MD5
73172eb205e7be53c8650181fa90f330
-
SHA1
2c1e33272826b529def3c1ff6164d6d0b3ce319d
-
SHA256
11dfdc2c94b4fd29b3abdd0e59548279773ca591e6ee989515a58532758de2a8
-
SHA512
c708629b5991da4fcd3d23afaeac20742ceb33eca7d8d952986f1572d8ea9601479b692dab8af0d3ea7054d250a8bb03b39a968f6b2fd66a02795e15db62d784
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0J:jDgtfRQUHPw06MoV2nwTBlhm8R
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 540 4572 rundll32.exe 76 PID 4572 wrote to memory of 540 4572 rundll32.exe 76 PID 4572 wrote to memory of 540 4572 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11dfdc2c94b4fd29b3abdd0e59548279773ca591e6ee989515a58532758de2a8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11dfdc2c94b4fd29b3abdd0e59548279773ca591e6ee989515a58532758de2a8.dll,#12⤵PID:540
-