Analysis
-
max time kernel
148s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
beb791b3ce8c7a7ea8e1a93c9545ea0a9480cccda5d2c75d156c760bd47d4975.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
beb791b3ce8c7a7ea8e1a93c9545ea0a9480cccda5d2c75d156c760bd47d4975.dll
Resource
win10v2004-20221111-en
General
-
Target
beb791b3ce8c7a7ea8e1a93c9545ea0a9480cccda5d2c75d156c760bd47d4975.dll
-
Size
64KB
-
MD5
ef57b542a2c69502abb12bec1bafaa85
-
SHA1
a31ac5f72f0c0aafe8cf0d76aef6e891e094fe96
-
SHA256
beb791b3ce8c7a7ea8e1a93c9545ea0a9480cccda5d2c75d156c760bd47d4975
-
SHA512
be6fe409f36255dd8db961151f50132c23c2e61380d951830063a79fe331857a001c8f13e54eca54009a0949fbafed55175044c7b448ce6a96887c17803643c6
-
SSDEEP
768:khibTrRgFZ0P/8NJid0NnG4jY4SSLIyA1T5IlmhEXRFO9sK01wJwVCqCOwlf+cbO:khC0K/8Pid0NnG8nAjS0I1wJw8Uwwcz
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4100 4896 rundll32.exe 82 PID 4896 wrote to memory of 4100 4896 rundll32.exe 82 PID 4896 wrote to memory of 4100 4896 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\beb791b3ce8c7a7ea8e1a93c9545ea0a9480cccda5d2c75d156c760bd47d4975.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\beb791b3ce8c7a7ea8e1a93c9545ea0a9480cccda5d2c75d156c760bd47d4975.dll,#12⤵PID:4100
-