Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
4ce2da389b9a7528f910efd81e37224f59ff59581877341af8daabb80f6f2dde.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4ce2da389b9a7528f910efd81e37224f59ff59581877341af8daabb80f6f2dde.dll
Resource
win10v2004-20220812-en
General
-
Target
4ce2da389b9a7528f910efd81e37224f59ff59581877341af8daabb80f6f2dde.dll
-
Size
24KB
-
MD5
d3f9312ce010d844e64b8540cc307dd0
-
SHA1
1216fc50a98f3e63c7368ce5d973254cf71c9ffe
-
SHA256
4ce2da389b9a7528f910efd81e37224f59ff59581877341af8daabb80f6f2dde
-
SHA512
c4b657135d3dc0f89388e9a9954707828a9f73d2ff306f84c704b4dcb33eb61ca7356374b72e979c91b70cc7f684844a66d0237257404a6c3d9b34366ed34d73
-
SSDEEP
384:p5//hyXNdtyXNdjByCvbxZENkqR928QBNwMjudzuF9yBeD/l7LDWl:p5hctcjsCvbx2928QBO309QerRGl
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 3972 1944 rundll32.exe 76 PID 1944 wrote to memory of 3972 1944 rundll32.exe 76 PID 1944 wrote to memory of 3972 1944 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ce2da389b9a7528f910efd81e37224f59ff59581877341af8daabb80f6f2dde.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ce2da389b9a7528f910efd81e37224f59ff59581877341af8daabb80f6f2dde.dll,#12⤵PID:3972
-