Analysis
-
max time kernel
181s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 01:43
Static task
static1
Behavioral task
behavioral1
Sample
fd38e5a02616b6b64ede502ae1a65fde227f14c850b40977ff91d71abece39a6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fd38e5a02616b6b64ede502ae1a65fde227f14c850b40977ff91d71abece39a6.dll
Resource
win10v2004-20221111-en
General
-
Target
fd38e5a02616b6b64ede502ae1a65fde227f14c850b40977ff91d71abece39a6.dll
-
Size
6KB
-
MD5
18aaa2bb808c8a9cae36c39f7a83e330
-
SHA1
003b001ea161fa33d97a1940e7b6afa72986f791
-
SHA256
fd38e5a02616b6b64ede502ae1a65fde227f14c850b40977ff91d71abece39a6
-
SHA512
688516d6362c4b2a899663ffb3cfbe2d7c91172ec30195603d9bc735972bfed785b72b8b4fb8a6e1d6a938dc79e8801b83fc27c570d035d42dc2e782bf5ab07b
-
SSDEEP
48:Ss0QejYDx6/gB5B65/ic/2hmm3YGebeTKurfUsMbQRxGBtf:z0QR9B6BvAwbQaBp
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4464 4824 rundll32.exe 83 PID 4824 wrote to memory of 4464 4824 rundll32.exe 83 PID 4824 wrote to memory of 4464 4824 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd38e5a02616b6b64ede502ae1a65fde227f14c850b40977ff91d71abece39a6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd38e5a02616b6b64ede502ae1a65fde227f14c850b40977ff91d71abece39a6.dll,#12⤵PID:4464
-