Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 02:18
Behavioral task
behavioral1
Sample
81d91812d3ef71aa59d2c486bba5d03ca2fe630bfad0f760c758ff22e0edeb19.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
81d91812d3ef71aa59d2c486bba5d03ca2fe630bfad0f760c758ff22e0edeb19.dll
Resource
win10v2004-20220901-en
General
-
Target
81d91812d3ef71aa59d2c486bba5d03ca2fe630bfad0f760c758ff22e0edeb19.dll
-
Size
50KB
-
MD5
0d7212e679b27d7317b1eeddf1dc30f7
-
SHA1
add38d7f60cb031515318e861b4ceae75072c652
-
SHA256
81d91812d3ef71aa59d2c486bba5d03ca2fe630bfad0f760c758ff22e0edeb19
-
SHA512
f5ac338e4639971b7af6d772df37ba443f4913cb843a8be1c4beb3e2ff6ee6b33abff1f02a1c63dc5d070307e01f40fec0ef790ad2b9e4857be3c6985b7238e6
-
SSDEEP
768:szM2xVVVW4W34c8X6yX0uQOWoMQIwwlVSgu3Bp2y2bUlhafhi5nqEJQLpPtJsK51:V2bDxWMXV+JVSgs27QlYfh6JJQJzhoLs
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4248 wrote to memory of 1188 4248 rundll32.exe 26 PID 4248 wrote to memory of 1188 4248 rundll32.exe 26 PID 4248 wrote to memory of 1188 4248 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81d91812d3ef71aa59d2c486bba5d03ca2fe630bfad0f760c758ff22e0edeb19.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81d91812d3ef71aa59d2c486bba5d03ca2fe630bfad0f760c758ff22e0edeb19.dll,#12⤵PID:1188
-