Analysis
-
max time kernel
324s -
max time network
435s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 21:58
Static task
static1
Behavioral task
behavioral1
Sample
f0c6f15eff9734eba6fe8083eebbff6c336cae085eb259a809c5228aa6ac011d.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
General
-
Target
f0c6f15eff9734eba6fe8083eebbff6c336cae085eb259a809c5228aa6ac011d.dll
-
Size
541KB
-
MD5
94d5e215e766ffdc0185c0c7f46baaa0
-
SHA1
9c3111c6d06eaf28696dd07270519bc3227d19e4
-
SHA256
f0c6f15eff9734eba6fe8083eebbff6c336cae085eb259a809c5228aa6ac011d
-
SHA512
29c0ca0e6ac22c7b673dd3c5683221eca3830029a937a3c964cb073c5331f7f27f9724d72858ac9ebfa3d604f3c34f68489094af441fe492a8d691aba2582060
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0i:jDgtfRQUHPw06MoV2nwTBlhm8q
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4612 wrote to memory of 4596 4612 rundll32.exe 79 PID 4612 wrote to memory of 4596 4612 rundll32.exe 79 PID 4612 wrote to memory of 4596 4612 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f0c6f15eff9734eba6fe8083eebbff6c336cae085eb259a809c5228aa6ac011d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f0c6f15eff9734eba6fe8083eebbff6c336cae085eb259a809c5228aa6ac011d.dll,#12⤵PID:4596
-