Analysis
-
max time kernel
152s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 00:24
Static task
static1
Behavioral task
behavioral1
Sample
9ef6951b6a3ae231d0d6e9b9b707e7786d122d5e2b28fe69c1b6d094eeb8053a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9ef6951b6a3ae231d0d6e9b9b707e7786d122d5e2b28fe69c1b6d094eeb8053a.dll
Resource
win10v2004-20221111-en
General
-
Target
9ef6951b6a3ae231d0d6e9b9b707e7786d122d5e2b28fe69c1b6d094eeb8053a.dll
-
Size
417KB
-
MD5
4a148ecc372442d640d0375af0178f80
-
SHA1
ccb3b8e286da5c9ac3fcff224cb9c05c43cf8e0e
-
SHA256
9ef6951b6a3ae231d0d6e9b9b707e7786d122d5e2b28fe69c1b6d094eeb8053a
-
SHA512
630944ccca929bcda4cad656f67196603a7c4dcec2ed787bf11f76d55c4d8c74f79b526fe73c61c9e70a663f32efd49f2f41a788e8bae48f3655dfc9cb48d951
-
SSDEEP
6144:GnqHSXCBFa4PSh7XeN6VnBoydOHRG9Ulzl13olCLFNrTwO9Ecg9Wh8YaN2pW0TNh:GqH+QiLwi+/Kbd0bZZAYOO4a
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1660 4564 rundll32.exe 84 PID 4564 wrote to memory of 1660 4564 rundll32.exe 84 PID 4564 wrote to memory of 1660 4564 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ef6951b6a3ae231d0d6e9b9b707e7786d122d5e2b28fe69c1b6d094eeb8053a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ef6951b6a3ae231d0d6e9b9b707e7786d122d5e2b28fe69c1b6d094eeb8053a.dll,#12⤵PID:1660
-