Analysis
-
max time kernel
153s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
787de783ae5638c5747d3aed0d1ee2042a116a5c243d1ad4b38548295aa6b26d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
787de783ae5638c5747d3aed0d1ee2042a116a5c243d1ad4b38548295aa6b26d.dll
Resource
win10v2004-20220812-en
General
-
Target
787de783ae5638c5747d3aed0d1ee2042a116a5c243d1ad4b38548295aa6b26d.dll
-
Size
32KB
-
MD5
d22b7b5de8079f400387a6f830e0eb58
-
SHA1
01a88888947bc7d9f1b0ac8cbc620a933941bcb6
-
SHA256
787de783ae5638c5747d3aed0d1ee2042a116a5c243d1ad4b38548295aa6b26d
-
SHA512
6e8516c56106f8ba0a10478db2af3d07c311392445fb44f5933f86da784b845a124544cabdbe64225043459b8b02fe2df5e28e2f46ccb18cbf8ef9bfdc7093b1
-
SSDEEP
768:RbHiJWRCmEPZMSEVVr4vq7CymaKdSVOyeRYj+i3:RbHiJDmKMSEVVd7Cd7G6RYqi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4720 wrote to memory of 3976 4720 rundll32.exe 80 PID 4720 wrote to memory of 3976 4720 rundll32.exe 80 PID 4720 wrote to memory of 3976 4720 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\787de783ae5638c5747d3aed0d1ee2042a116a5c243d1ad4b38548295aa6b26d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\787de783ae5638c5747d3aed0d1ee2042a116a5c243d1ad4b38548295aa6b26d.dll,#12⤵PID:3976
-