Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 01:46
Static task
static1
Behavioral task
behavioral1
Sample
f0ea917e0c5b58b0a2f1f81be2aefe4a928b49e5b3b9dad62747d8d96a34f733.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f0ea917e0c5b58b0a2f1f81be2aefe4a928b49e5b3b9dad62747d8d96a34f733.dll
Resource
win10v2004-20220812-en
General
-
Target
f0ea917e0c5b58b0a2f1f81be2aefe4a928b49e5b3b9dad62747d8d96a34f733.dll
-
Size
7KB
-
MD5
47997ac1ad7aae98bec97df30bc9b300
-
SHA1
9d38c7280331e593e63d1b0b069372af8e2d8619
-
SHA256
f0ea917e0c5b58b0a2f1f81be2aefe4a928b49e5b3b9dad62747d8d96a34f733
-
SHA512
d5274ca9349fd042087d9152bc74f22ca9245b7b70c339d2f2bd6f37472dce84fa91b89ff586c280c0af9b5e7541c616f4a243f41c16e7fd2f25eb809bf69d70
-
SSDEEP
96:Ts1Wnnnynnnnnnnn6nnann7nnXnnbnnKniRO6tn6uCXCXh50tr6U9TmTWYwMha+R:YXVCXg0pFmffdnwU4ptR79
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3192 wrote to memory of 3300 3192 rundll32.exe 81 PID 3192 wrote to memory of 3300 3192 rundll32.exe 81 PID 3192 wrote to memory of 3300 3192 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f0ea917e0c5b58b0a2f1f81be2aefe4a928b49e5b3b9dad62747d8d96a34f733.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f0ea917e0c5b58b0a2f1f81be2aefe4a928b49e5b3b9dad62747d8d96a34f733.dll,#12⤵PID:3300
-