Analysis
-
max time kernel
187s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
9f505649b740ad16aac579b7f7628a72aa36bcf60a59b824a923f9280587512e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9f505649b740ad16aac579b7f7628a72aa36bcf60a59b824a923f9280587512e.dll
Resource
win10v2004-20221111-en
General
-
Target
9f505649b740ad16aac579b7f7628a72aa36bcf60a59b824a923f9280587512e.dll
-
Size
32KB
-
MD5
f014a72e0c8cf97a1e8f6c82e864f7c0
-
SHA1
32346fdccc61728aeefa6262a1c45455beb722b4
-
SHA256
9f505649b740ad16aac579b7f7628a72aa36bcf60a59b824a923f9280587512e
-
SHA512
74ca601f66308d69911b835f12db0ee87659ddf7ca88858d6507be7daa662c6916e18fe36f5c63f7b07a56e683de4715cb9484af615d13dc48e7376805578ef9
-
SSDEEP
768:kt+NP27D6a8deklv/LT7PlhXlK9VfShVfLRBQ2L7:kt+p272es/7PlhVK3aHDRD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4456 wrote to memory of 3320 4456 rundll32.exe 82 PID 4456 wrote to memory of 3320 4456 rundll32.exe 82 PID 4456 wrote to memory of 3320 4456 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f505649b740ad16aac579b7f7628a72aa36bcf60a59b824a923f9280587512e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f505649b740ad16aac579b7f7628a72aa36bcf60a59b824a923f9280587512e.dll,#12⤵PID:3320
-