Analysis
-
max time kernel
112s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
aae11d09e1bff3e964eb8410ca0e063ca95181d13fad315590a5a12e25a88699.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aae11d09e1bff3e964eb8410ca0e063ca95181d13fad315590a5a12e25a88699.dll
Resource
win10v2004-20220901-en
General
-
Target
aae11d09e1bff3e964eb8410ca0e063ca95181d13fad315590a5a12e25a88699.dll
-
Size
7KB
-
MD5
61d0ac8ee37f4a53e8de4dca17c29910
-
SHA1
773a1886d29565906f317a0f2a13406f20298949
-
SHA256
aae11d09e1bff3e964eb8410ca0e063ca95181d13fad315590a5a12e25a88699
-
SHA512
2c524446eac63e09fdd174ccf630c1ac8632954d0c9623b85fde14a7e26fbd5a906bd35fb7f2b57fe1b7b7b28d8bccb3e3701803030e04d67ce704bde5f1480e
-
SSDEEP
96:WLRxkjujtjd8jPjcZG2UoWAASZeGv5fAfg648nVS5nV:WtqKR6bgYIv0Z1sn
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4316 4880 rundll32.exe 81 PID 4880 wrote to memory of 4316 4880 rundll32.exe 81 PID 4880 wrote to memory of 4316 4880 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aae11d09e1bff3e964eb8410ca0e063ca95181d13fad315590a5a12e25a88699.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aae11d09e1bff3e964eb8410ca0e063ca95181d13fad315590a5a12e25a88699.dll,#12⤵PID:4316
-