Analysis
-
max time kernel
63s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
c154f2004f1f13a4a0cad75d72f9967bcf6f7674e5635fbf66c6fa80be15e78c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c154f2004f1f13a4a0cad75d72f9967bcf6f7674e5635fbf66c6fa80be15e78c.dll
Resource
win10v2004-20220901-en
General
-
Target
c154f2004f1f13a4a0cad75d72f9967bcf6f7674e5635fbf66c6fa80be15e78c.dll
-
Size
192KB
-
MD5
9310ecf6d7fe5a6b1244eebf40e23479
-
SHA1
ee8d8ace49145f374a6746557c9f73cca8f6265d
-
SHA256
c154f2004f1f13a4a0cad75d72f9967bcf6f7674e5635fbf66c6fa80be15e78c
-
SHA512
83f7d3cd3bceb71c59f9e7ad93b431296f15effe1b5c6720caa29172febabfaf8c0589957db0309b98d9741d53dc4677d453505efe78f5cba98a971b710ee0cd
-
SSDEEP
3072:yUyNm5nn/r4YXqgg+CKJH7Km+qQFbbosHywr73/imshZwgtXA:yUFNXqggpKJW3BehhA
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2732 3068 rundll32.exe 81 PID 3068 wrote to memory of 2732 3068 rundll32.exe 81 PID 3068 wrote to memory of 2732 3068 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c154f2004f1f13a4a0cad75d72f9967bcf6f7674e5635fbf66c6fa80be15e78c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c154f2004f1f13a4a0cad75d72f9967bcf6f7674e5635fbf66c6fa80be15e78c.dll,#12⤵PID:2732
-