Analysis
-
max time kernel
166s -
max time network
223s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 02:06
Static task
static1
Behavioral task
behavioral1
Sample
86e44e81c483db05d2fbd6d17ba82049b2d3aaf21b137e11d54ab4234cf8285c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86e44e81c483db05d2fbd6d17ba82049b2d3aaf21b137e11d54ab4234cf8285c.dll
Resource
win10v2004-20221111-en
General
-
Target
86e44e81c483db05d2fbd6d17ba82049b2d3aaf21b137e11d54ab4234cf8285c.dll
-
Size
171KB
-
MD5
908b5e881b7814ff9cd92ed770508ad4
-
SHA1
4452f67a77b0492991c1ef07c05ea6a010e70485
-
SHA256
86e44e81c483db05d2fbd6d17ba82049b2d3aaf21b137e11d54ab4234cf8285c
-
SHA512
55c8d4d4857c4df17a26c6f9a98c81a70ba2822aa20fa8510aa0c1d885d301fbafecef2dbca945afb8eba17a7f340b8666b89fb3ec8219e461c7f70cfa648041
-
SSDEEP
3072:OQV9qkfbCd3wQfF+DU5lJcTGubd9Irjwv+d0EyF0pEnaUDsIl6R5ld44j0XYD:OufbCBwQI8D6FKrjb2u3KTqDBC
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2112 2560 rundll32.exe 82 PID 2560 wrote to memory of 2112 2560 rundll32.exe 82 PID 2560 wrote to memory of 2112 2560 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86e44e81c483db05d2fbd6d17ba82049b2d3aaf21b137e11d54ab4234cf8285c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86e44e81c483db05d2fbd6d17ba82049b2d3aaf21b137e11d54ab4234cf8285c.dll,#12⤵PID:2112
-