Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
95df7d6d5186d4e74becfced3af51a68bf8ba82dbf3e8ceed0081d897970ac50.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
95df7d6d5186d4e74becfced3af51a68bf8ba82dbf3e8ceed0081d897970ac50.dll
Resource
win10v2004-20220812-en
General
-
Target
95df7d6d5186d4e74becfced3af51a68bf8ba82dbf3e8ceed0081d897970ac50.dll
-
Size
58KB
-
MD5
4ff49e50ec002cda7b61a927d01e5f9b
-
SHA1
76a27dd1563db97aec7c50f56e3287f0434609fa
-
SHA256
95df7d6d5186d4e74becfced3af51a68bf8ba82dbf3e8ceed0081d897970ac50
-
SHA512
cff086b3f03ace323bf98c316dd943e0d74a08eb38eb81c4a50aab09265e535eddf051e6358afea9f167c6092a77756804f116a1b3f8333b90a0a75b1b1abd03
-
SSDEEP
1536:4u5UibF4zuURG/hrtcsIgjjeg0J4jbO0+SLXY:Ty2F4zOxcbg3RW41+SLXY
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4392 4604 rundll32.exe 78 PID 4604 wrote to memory of 4392 4604 rundll32.exe 78 PID 4604 wrote to memory of 4392 4604 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95df7d6d5186d4e74becfced3af51a68bf8ba82dbf3e8ceed0081d897970ac50.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\95df7d6d5186d4e74becfced3af51a68bf8ba82dbf3e8ceed0081d897970ac50.dll,#12⤵PID:4392
-