Analysis
-
max time kernel
185s -
max time network
235s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 19:39
Behavioral task
behavioral1
Sample
310f7cc7798e7eafe263725df10485cb4e08ce3cd4cec8795a2c95c0416bb02e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
310f7cc7798e7eafe263725df10485cb4e08ce3cd4cec8795a2c95c0416bb02e.dll
Resource
win10v2004-20221111-en
General
-
Target
310f7cc7798e7eafe263725df10485cb4e08ce3cd4cec8795a2c95c0416bb02e.dll
-
Size
60KB
-
MD5
fc823637bbb5a0c8f9c6bec13a97fdc0
-
SHA1
1beafbc1050c2e5d3630a0110f01de59d4f09d5b
-
SHA256
310f7cc7798e7eafe263725df10485cb4e08ce3cd4cec8795a2c95c0416bb02e
-
SHA512
09cfd63a3a1185a393f7d727271fdeaa526ab2a1aed232dfb62356b9609a0f7f1ac1ed6ca50ae917fef2ee48cd20df2c2c244e477e149ff863abfca9e4bf0f05
-
SSDEEP
768:h8WTpVT0X8zb3RD5TFCnrSGvRUjHf8P81f/0h7oUTotUq4oe1iIqz/kynRNrMf4w:RV7kVpUjHEkdQoguUq4oeeJNAQA
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3676 wrote to memory of 3200 3676 rundll32.exe 81 PID 3676 wrote to memory of 3200 3676 rundll32.exe 81 PID 3676 wrote to memory of 3200 3676 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\310f7cc7798e7eafe263725df10485cb4e08ce3cd4cec8795a2c95c0416bb02e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\310f7cc7798e7eafe263725df10485cb4e08ce3cd4cec8795a2c95c0416bb02e.dll,#12⤵PID:3200
-