Analysis
-
max time kernel
176s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 01:03
Static task
static1
Behavioral task
behavioral1
Sample
07e2202c7b3c08aed5123c62af769257dc1e21a3977fe2b0c011e44164613241.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
07e2202c7b3c08aed5123c62af769257dc1e21a3977fe2b0c011e44164613241.dll
Resource
win10v2004-20221111-en
General
-
Target
07e2202c7b3c08aed5123c62af769257dc1e21a3977fe2b0c011e44164613241.dll
-
Size
120KB
-
MD5
da2f9579af7880290e165ca0d8d52810
-
SHA1
4e3bce2eaa8cb164f9c3317d1983088623626c22
-
SHA256
07e2202c7b3c08aed5123c62af769257dc1e21a3977fe2b0c011e44164613241
-
SHA512
8a24bd2a1b87fc56601bc193aeaa42b7063c78d9bfbc70663be2a7cbf4cfd3a277df6f8c1a87afde7af4cf760315f8dbfd69adefc1ed727d896dffaf74e298cc
-
SSDEEP
1536:9Q0M74IvZs0/f2cXY64reQw4pY5eVxart2y9zyTGRKs0:Sn7Ti0W2Y6aPBpKerSzyTGe
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 60 wrote to memory of 964 60 rundll32.exe 82 PID 60 wrote to memory of 964 60 rundll32.exe 82 PID 60 wrote to memory of 964 60 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07e2202c7b3c08aed5123c62af769257dc1e21a3977fe2b0c011e44164613241.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07e2202c7b3c08aed5123c62af769257dc1e21a3977fe2b0c011e44164613241.dll,#12⤵PID:964
-