Analysis
-
max time kernel
75s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
6f451f7862ecf25fa31c1017b83e9c2fd162bc8959088a1e51757eb1822d1e57.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6f451f7862ecf25fa31c1017b83e9c2fd162bc8959088a1e51757eb1822d1e57.dll
Resource
win10v2004-20220901-en
General
-
Target
6f451f7862ecf25fa31c1017b83e9c2fd162bc8959088a1e51757eb1822d1e57.dll
-
Size
6KB
-
MD5
d57fbc8f7d817d05759ca4b4d2eef040
-
SHA1
926cc1ef31e561e6d921a7472e31a3fc7e48b285
-
SHA256
6f451f7862ecf25fa31c1017b83e9c2fd162bc8959088a1e51757eb1822d1e57
-
SHA512
b2301deaeede1a2fac1cc36b7e6b8b34497def9e296eacd7b31fa8150890303bfeb69fa5104da9e37cd1366bc8e117d4bb1a815fbc73a582be42d92b2ea3b662
-
SSDEEP
48:SfIBj0W6/aGxkaklS4rklStklSd8klSPklSTIZGifi5qwlGsPvw16ShuDSSM+b+m:DixZjmjtjd8jPjcZGR5TI16S4SM
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3704 wrote to memory of 1612 3704 rundll32.exe 63 PID 3704 wrote to memory of 1612 3704 rundll32.exe 63 PID 3704 wrote to memory of 1612 3704 rundll32.exe 63
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f451f7862ecf25fa31c1017b83e9c2fd162bc8959088a1e51757eb1822d1e57.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f451f7862ecf25fa31c1017b83e9c2fd162bc8959088a1e51757eb1822d1e57.dll,#12⤵PID:1612
-