Analysis
-
max time kernel
222s -
max time network
247s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
6bf7f9e39c9602bd97814ea9c3a346e8dc624daf3670bc4586957ac18d34ad39.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6bf7f9e39c9602bd97814ea9c3a346e8dc624daf3670bc4586957ac18d34ad39.dll
Resource
win10v2004-20221111-en
General
-
Target
6bf7f9e39c9602bd97814ea9c3a346e8dc624daf3670bc4586957ac18d34ad39.dll
-
Size
255KB
-
MD5
badd15a0bb29d9acecaf12bb642d8080
-
SHA1
ff257d0be4199692c46e988c87a29a5067e88a48
-
SHA256
6bf7f9e39c9602bd97814ea9c3a346e8dc624daf3670bc4586957ac18d34ad39
-
SHA512
220cf9bf77c5ea80cc89a3a55da9976817d28f0e888efc7be049b5a8f7a5c15c14e2da532601d5ba5fd7b53ef43bd1c0a9b64fc47e24b3a4dc14a2d257f8ceb7
-
SSDEEP
3072:HQZX4vr1VAw0AWfdN2AGTVyLi5ETDG642LD9gZoyJQkCtWPnOdX:HQZX4vrBPLRvQkKWP
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1152 wrote to memory of 4604 1152 rundll32.exe 81 PID 1152 wrote to memory of 4604 1152 rundll32.exe 81 PID 1152 wrote to memory of 4604 1152 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6bf7f9e39c9602bd97814ea9c3a346e8dc624daf3670bc4586957ac18d34ad39.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6bf7f9e39c9602bd97814ea9c3a346e8dc624daf3670bc4586957ac18d34ad39.dll,#12⤵PID:4604
-