Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 06:01
Static task
static1
Behavioral task
behavioral1
Sample
12a7d3db88c21fc9e77e9cce973a7137bfa0b6f9458586b085fc2606235e2e08.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12a7d3db88c21fc9e77e9cce973a7137bfa0b6f9458586b085fc2606235e2e08.dll
Resource
win10v2004-20220812-en
General
-
Target
12a7d3db88c21fc9e77e9cce973a7137bfa0b6f9458586b085fc2606235e2e08.dll
-
Size
159KB
-
MD5
7967762ffaee2bfab42ff7e9f460897d
-
SHA1
a5e6b521471e98da2598df03e9e8420eecd7cdac
-
SHA256
12a7d3db88c21fc9e77e9cce973a7137bfa0b6f9458586b085fc2606235e2e08
-
SHA512
c71931c01e99c683da032780554f09b4c7004150d1a3d2ae8169708570f482136d3ba69f69db3c1735787ab117b3ee35532e42909dca62b36a78562a67f14386
-
SSDEEP
3072:+7pmNyxvfGcCVNEPhf29RZvOzmuTBhFCcTGKXZ:+7pmNQfTCVNU1BhFCci
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3460 wrote to memory of 3548 3460 rundll32.exe 79 PID 3460 wrote to memory of 3548 3460 rundll32.exe 79 PID 3460 wrote to memory of 3548 3460 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12a7d3db88c21fc9e77e9cce973a7137bfa0b6f9458586b085fc2606235e2e08.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12a7d3db88c21fc9e77e9cce973a7137bfa0b6f9458586b085fc2606235e2e08.dll,#12⤵PID:3548
-