Analysis
-
max time kernel
249s -
max time network
328s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
9683402afebc31607969efe675a6827684addbaad2dccf85c38f28ccb7ed134c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9683402afebc31607969efe675a6827684addbaad2dccf85c38f28ccb7ed134c.dll
Resource
win10v2004-20221111-en
General
-
Target
9683402afebc31607969efe675a6827684addbaad2dccf85c38f28ccb7ed134c.dll
-
Size
221KB
-
MD5
974c30682e44447255e6fd3258a4f7bb
-
SHA1
aadc84edea4131119286026e8224d425f324ab67
-
SHA256
9683402afebc31607969efe675a6827684addbaad2dccf85c38f28ccb7ed134c
-
SHA512
344312f83c371d2edc908323f36f6d39726a8db9df41f2f5772ee80a387a8c2ee7d9d0907d8b9fe07b0c8c4507e1fbce80b6e1a3ecfc7e1e9c37487946196c6d
-
SSDEEP
6144:pZJt7PKJ4gJkYB2DMBHuHt4ooyNatqkKdHetO0pL31z1zRGMk:pLQ4gJZ2DE6Z1NatJuJ0pL31NUz
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4436 wrote to memory of 4032 4436 rundll32.exe 80 PID 4436 wrote to memory of 4032 4436 rundll32.exe 80 PID 4436 wrote to memory of 4032 4436 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9683402afebc31607969efe675a6827684addbaad2dccf85c38f28ccb7ed134c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9683402afebc31607969efe675a6827684addbaad2dccf85c38f28ccb7ed134c.dll,#12⤵PID:4032
-