Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 02:43
Static task
static1
Behavioral task
behavioral1
Sample
7f669e0c2058ebd85e5a65ec5857dea3d1fb363ee153a0d2e818c66f20420e09.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7f669e0c2058ebd85e5a65ec5857dea3d1fb363ee153a0d2e818c66f20420e09.dll
Resource
win10v2004-20220812-en
General
-
Target
7f669e0c2058ebd85e5a65ec5857dea3d1fb363ee153a0d2e818c66f20420e09.dll
-
Size
147KB
-
MD5
2a110c3e7b8dc6d30616654f2b1525d0
-
SHA1
1c85b8df49eec511ff083b5fc9f7523dcf07c276
-
SHA256
7f669e0c2058ebd85e5a65ec5857dea3d1fb363ee153a0d2e818c66f20420e09
-
SHA512
cc8f78d29235ac4f06d894c68410c946d622c5d959931770de90ec30b68d7cb344b2b2dd072cfaf7783f77d31ef52ee3f918d8d3f9306f9ec1b84141d0474238
-
SSDEEP
1536:hAcIfMI7IjkuvfZ/AuwdcLN3KybbUm8odCwPXkdrNYVWmCcno7GBTAcsqd1KJb:hXfU8xvfGdo3KAFgdrNYVWfcPAsc
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4728 wrote to memory of 1708 4728 rundll32.exe 79 PID 4728 wrote to memory of 1708 4728 rundll32.exe 79 PID 4728 wrote to memory of 1708 4728 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f669e0c2058ebd85e5a65ec5857dea3d1fb363ee153a0d2e818c66f20420e09.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f669e0c2058ebd85e5a65ec5857dea3d1fb363ee153a0d2e818c66f20420e09.dll,#12⤵PID:1708
-