Analysis
-
max time kernel
176s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
800f39d0734c35afdf31d1da6cb5277c27fac27c37cb7c52e09bd22d663529ff.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
800f39d0734c35afdf31d1da6cb5277c27fac27c37cb7c52e09bd22d663529ff.dll
Resource
win10v2004-20220812-en
General
-
Target
800f39d0734c35afdf31d1da6cb5277c27fac27c37cb7c52e09bd22d663529ff.dll
-
Size
8KB
-
MD5
f2839f2288d670d9da8fb348e9edaec7
-
SHA1
fd1d4c171bad8c7471304f9d6c668a0bd394753c
-
SHA256
800f39d0734c35afdf31d1da6cb5277c27fac27c37cb7c52e09bd22d663529ff
-
SHA512
8b001be5d18bf3dbd76f8626a9db85b6e48e324ffb02a5bd8094ab64a122cf0fa36c955e465449c1aa06ba4d4282b9f15f03e19df3c1c8e0c5f7ac6d32f5895d
-
SSDEEP
192:zw8dHabRDEgtHyl0NSypWak6HVdW3yWak8QjdW3w9:NdHad/N20IypWak8dWiWak8EdW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4468 4904 rundll32.exe 79 PID 4904 wrote to memory of 4468 4904 rundll32.exe 79 PID 4904 wrote to memory of 4468 4904 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\800f39d0734c35afdf31d1da6cb5277c27fac27c37cb7c52e09bd22d663529ff.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\800f39d0734c35afdf31d1da6cb5277c27fac27c37cb7c52e09bd22d663529ff.dll,#12⤵PID:4468
-