Analysis
-
max time kernel
193s -
max time network
219s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
90563d999608578190e5715aad8b33f73c9c6fc84bbd29427bc79f8f44f8ba32.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90563d999608578190e5715aad8b33f73c9c6fc84bbd29427bc79f8f44f8ba32.dll
Resource
win10v2004-20221111-en
General
-
Target
90563d999608578190e5715aad8b33f73c9c6fc84bbd29427bc79f8f44f8ba32.dll
-
Size
76KB
-
MD5
8119b1ee02f6a96a4d5cfc4770629c96
-
SHA1
6460c68d9a6e5c60e13a5db7cf01448a7bb54e06
-
SHA256
90563d999608578190e5715aad8b33f73c9c6fc84bbd29427bc79f8f44f8ba32
-
SHA512
372e1a16bdefeed63dbb0ee9f64f788639fcc98980acdb6218bd3f9c6253727d61e241ebdb77d237f9212485c0dc70657fff9e4feabaeda076cab4aeef711262
-
SSDEEP
1536:c/N/7xfiQysQYQgMI0E8TgI0E8Mk0H/Xzr7brD7Hbn12jZ9xvaQjFXwtClyyu6G:5YQgMI0E8UI0E8Mk0H/Xzr7brD7HbnUO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3712 wrote to memory of 1240 3712 rundll32.exe 81 PID 3712 wrote to memory of 1240 3712 rundll32.exe 81 PID 3712 wrote to memory of 1240 3712 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90563d999608578190e5715aad8b33f73c9c6fc84bbd29427bc79f8f44f8ba32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90563d999608578190e5715aad8b33f73c9c6fc84bbd29427bc79f8f44f8ba32.dll,#12⤵PID:1240
-