Analysis
-
max time kernel
175s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 08:06
Behavioral task
behavioral1
Sample
8d2d578c6320eefa0661049408fb9cd7a2ea4274adf2cb91a3d00cdb98925049.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
8d2d578c6320eefa0661049408fb9cd7a2ea4274adf2cb91a3d00cdb98925049.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
8d2d578c6320eefa0661049408fb9cd7a2ea4274adf2cb91a3d00cdb98925049.dll
-
Size
503KB
-
MD5
c16c85cbe11d90ddbdcd3f5d27ef152a
-
SHA1
0cf3d0a34f109ec61b2247857ff7e50f231bfaa2
-
SHA256
8d2d578c6320eefa0661049408fb9cd7a2ea4274adf2cb91a3d00cdb98925049
-
SHA512
e1d709c6549ed57190b1a36ccdb909d3e27cadd6e392e0bbdc279d32473781f98b4a8b302e777db2780203895bc13c171d2d0f04f4f6ee104586376c576ee94d
-
SSDEEP
12288:Ki7jIK3znwON9sbeV94iq3F0jjeXbDg1nNGZLtSLbpp9leqdP2:Jj3rvN9yeVCf0j6LTl0X9l9u
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\f22cf3af12.dl rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4904 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4336 wrote to memory of 4904 4336 rundll32.exe 83 PID 4336 wrote to memory of 4904 4336 rundll32.exe 83 PID 4336 wrote to memory of 4904 4336 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d2d578c6320eefa0661049408fb9cd7a2ea4274adf2cb91a3d00cdb98925049.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d2d578c6320eefa0661049408fb9cd7a2ea4274adf2cb91a3d00cdb98925049.dll,#12⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
PID:4904
-