Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 22:05
Static task
static1
Behavioral task
behavioral1
Sample
042a484119cb4cd5e6e26c7a18f040189ebed6646d1238672d97c7d73cf79848.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
General
-
Target
042a484119cb4cd5e6e26c7a18f040189ebed6646d1238672d97c7d73cf79848.dll
-
Size
628KB
-
MD5
eed5d7f8bca65c8925578c40601e5690
-
SHA1
1164caa8613734cbda22b8a0ae7f5975073abb48
-
SHA256
042a484119cb4cd5e6e26c7a18f040189ebed6646d1238672d97c7d73cf79848
-
SHA512
64df01da58204f9d97d7ac606cdc401aa4e14b5f55b63005d5ca47078dfabd1978d096235f4c39cf2e8c928e360a539ca74345bd8d3fd8990c26361ff063d513
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0I:jDgtfRQUHPw06MoV2nwTBlhm8g
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3212 wrote to memory of 4372 3212 rundll32.exe 81 PID 3212 wrote to memory of 4372 3212 rundll32.exe 81 PID 3212 wrote to memory of 4372 3212 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\042a484119cb4cd5e6e26c7a18f040189ebed6646d1238672d97c7d73cf79848.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\042a484119cb4cd5e6e26c7a18f040189ebed6646d1238672d97c7d73cf79848.dll,#12⤵PID:4372
-