Analysis
-
max time kernel
102s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 19:42
Behavioral task
behavioral1
Sample
616c23cbb3cb17b9aefd04d345611088d09ea35dde16f879d18f19d177e35f24.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
616c23cbb3cb17b9aefd04d345611088d09ea35dde16f879d18f19d177e35f24.dll
Resource
win10v2004-20220812-en
General
-
Target
616c23cbb3cb17b9aefd04d345611088d09ea35dde16f879d18f19d177e35f24.dll
-
Size
63KB
-
MD5
39b4fa0e414ab05f6de2d6f60e137c39
-
SHA1
2b0e0a0aa302b49feed435a19a8c1745eb8222c5
-
SHA256
616c23cbb3cb17b9aefd04d345611088d09ea35dde16f879d18f19d177e35f24
-
SHA512
e887ec1bbcab719977f431db987163b9abdbadef04576745d72c9ba5eafa4b1b0c90ab90d8362bed77f6885b2cad92eb1192985bf421cf9b57b5f4a23e0baac3
-
SSDEEP
768:yuUr3ip/IHI7NQTvezLBpukkGSm8hFNqwAEQCV9LuTNx+le228a/OY7pBUQfGdtB:yl3E0TmPBQBBmOFNq+DLubqJginN2m7
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4864-133-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2016 wrote to memory of 4864 2016 rundll32.exe 79 PID 2016 wrote to memory of 4864 2016 rundll32.exe 79 PID 2016 wrote to memory of 4864 2016 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\616c23cbb3cb17b9aefd04d345611088d09ea35dde16f879d18f19d177e35f24.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\616c23cbb3cb17b9aefd04d345611088d09ea35dde16f879d18f19d177e35f24.dll,#12⤵PID:4864
-