Analysis
-
max time kernel
166s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 04:31
Behavioral task
behavioral1
Sample
60a3bfedfa3ee252e3de5de87ef39f23ceba3eaa717f85b447c855a0cf805cf5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
60a3bfedfa3ee252e3de5de87ef39f23ceba3eaa717f85b447c855a0cf805cf5.dll
Resource
win10v2004-20220812-en
General
-
Target
60a3bfedfa3ee252e3de5de87ef39f23ceba3eaa717f85b447c855a0cf805cf5.dll
-
Size
65KB
-
MD5
0cd87c672d7dba2d8f8d8545a27c1e48
-
SHA1
74c4905df3464d85800e1f9ec92982936a95305d
-
SHA256
60a3bfedfa3ee252e3de5de87ef39f23ceba3eaa717f85b447c855a0cf805cf5
-
SHA512
a4c7264a6064604c7f650dffe12888523ebe50c6df2b5f2c04ac10472e3f8198a04189ad1e99bf4cfd60219d816c26c9c2ed9e47a21a904ad73ab28c00ffb1e0
-
SSDEEP
768:9xBtKtqyLUZyD9TfLphHfGLifOqoTFspagKZWsJVnVZObujxNsfgHQHprlEYhFsi:9oXGmfTo2agK5VZObIAdRve6Be5hzrW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4024 wrote to memory of 2536 4024 rundll32.exe 79 PID 4024 wrote to memory of 2536 4024 rundll32.exe 79 PID 4024 wrote to memory of 2536 4024 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60a3bfedfa3ee252e3de5de87ef39f23ceba3eaa717f85b447c855a0cf805cf5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60a3bfedfa3ee252e3de5de87ef39f23ceba3eaa717f85b447c855a0cf805cf5.dll,#12⤵PID:2536
-