Analysis
-
max time kernel
182s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
426bf99957a09887cca0629eb6f6df1fa4d0bd183a1bbb410272fbb92e557bb8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
426bf99957a09887cca0629eb6f6df1fa4d0bd183a1bbb410272fbb92e557bb8.dll
Resource
win10v2004-20220812-en
General
-
Target
426bf99957a09887cca0629eb6f6df1fa4d0bd183a1bbb410272fbb92e557bb8.dll
-
Size
124KB
-
MD5
00c6d3fa9529cab0b3f292fe1b00d96d
-
SHA1
878187569b011a791c6a03c5c3ba7cfb69ae1b11
-
SHA256
426bf99957a09887cca0629eb6f6df1fa4d0bd183a1bbb410272fbb92e557bb8
-
SHA512
0af45e72659eb0872c33e0b75cdebc3d9ea0a5bbc4da8842e78185c506d52febb93ea18e4da0d8d51fceb377a0164da6394571e0c60f41c5eb541b5102c2dd41
-
SSDEEP
3072:tS78uT08Z9ETaMQgETAfak1effvN8tt+tNfaTwJQh5Fhq:T8wTaMQgETWONZBa5zFhq
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 1372 4240 rundll32.exe 80 PID 4240 wrote to memory of 1372 4240 rundll32.exe 80 PID 4240 wrote to memory of 1372 4240 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\426bf99957a09887cca0629eb6f6df1fa4d0bd183a1bbb410272fbb92e557bb8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\426bf99957a09887cca0629eb6f6df1fa4d0bd183a1bbb410272fbb92e557bb8.dll,#12⤵PID:1372
-