Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 16:12
Static task
static1
Behavioral task
behavioral1
Sample
f147f20bbe9add6494dd211b240e45eb95cc940f423dfee03a553f11c3d8e671.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f147f20bbe9add6494dd211b240e45eb95cc940f423dfee03a553f11c3d8e671.dll
Resource
win10v2004-20220901-en
General
-
Target
f147f20bbe9add6494dd211b240e45eb95cc940f423dfee03a553f11c3d8e671.dll
-
Size
136KB
-
MD5
f048e1d67afc75bbd569aefe3d61d020
-
SHA1
4e650ff677e046c316d827aba9b4399b7b2cfd75
-
SHA256
f147f20bbe9add6494dd211b240e45eb95cc940f423dfee03a553f11c3d8e671
-
SHA512
83d537cd0e6d7881a0a3b5cf07942268596e8170041557a34f6eee6a52f9c780bd1863d040fbde49dca67c636bba1da6f9d882c95b7f5c360cf2396a15f69b4e
-
SSDEEP
3072:z8wA0/MPNtg1ygFG6XQ0/syVpILTQygewGOogk160I6G:z8wuPQJ2tukg3
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4712 wrote to memory of 384 4712 rundll32.exe 80 PID 4712 wrote to memory of 384 4712 rundll32.exe 80 PID 4712 wrote to memory of 384 4712 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f147f20bbe9add6494dd211b240e45eb95cc940f423dfee03a553f11c3d8e671.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f147f20bbe9add6494dd211b240e45eb95cc940f423dfee03a553f11c3d8e671.dll,#12⤵PID:384
-