Analysis
-
max time kernel
147s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 01:02
Behavioral task
behavioral1
Sample
8dc15c98094aaf871be2467f5e75bd1a4122406aa19bd4fc21d19f09909a43f0.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
8dc15c98094aaf871be2467f5e75bd1a4122406aa19bd4fc21d19f09909a43f0.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
8dc15c98094aaf871be2467f5e75bd1a4122406aa19bd4fc21d19f09909a43f0.dll
-
Size
156KB
-
MD5
711879bec4a60ed3accfce080d179946
-
SHA1
0b511732e95ef9cce92c908d044d3681900dbeed
-
SHA256
8dc15c98094aaf871be2467f5e75bd1a4122406aa19bd4fc21d19f09909a43f0
-
SHA512
2f3e0ddcc22188bcd972b7e93c12322f29eb99640d3959eb2ffbe5d79e15fb50b7714280e4fa2f7a15e4b40e18bbb851bfb26b8e9673d16d8fb2e0f31aa42db4
-
SSDEEP
3072:8gaZydhMp4/MUCOHu6Au+cb7mcJc0vE152YDjHlphfvs4SmNBO/jFiz:8gaQdhAH6AuLa+XSjHN8oPKw
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1120-133-0x0000000010000000-0x0000000010067000-memory.dmp vmprotect behavioral2/memory/1120-136-0x0000000010000000-0x0000000010067000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4208 wrote to memory of 1120 4208 rundll32.exe 78 PID 4208 wrote to memory of 1120 4208 rundll32.exe 78 PID 4208 wrote to memory of 1120 4208 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8dc15c98094aaf871be2467f5e75bd1a4122406aa19bd4fc21d19f09909a43f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8dc15c98094aaf871be2467f5e75bd1a4122406aa19bd4fc21d19f09909a43f0.dll,#12⤵PID:1120
-