Analysis
-
max time kernel
91s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
a0f59dfb1df4d43e68b5a5de21b0f6760537d932dd694d3b4c7af2dfd4574887.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a0f59dfb1df4d43e68b5a5de21b0f6760537d932dd694d3b4c7af2dfd4574887.dll
Resource
win10v2004-20220812-en
General
-
Target
a0f59dfb1df4d43e68b5a5de21b0f6760537d932dd694d3b4c7af2dfd4574887.dll
-
Size
6KB
-
MD5
873e18b3aed35e1883f3299845c97120
-
SHA1
404f9c98eea10972d4b0c8a3ba4283c0cca3c5ac
-
SHA256
a0f59dfb1df4d43e68b5a5de21b0f6760537d932dd694d3b4c7af2dfd4574887
-
SHA512
dd4839953f3152bf04f48caef18400d67f1b4c877265950dab2d413ab71a928ab495d49c37ad956143db9afd3aa328becb7e633cefc1a5f4d6c7ceb3d7cb3e24
-
SSDEEP
96:nGTKrYJyJ5gT9jXk9eXWI/n9e1r/CVd7p0jsnmUD7hAB:nGTWJGp0UZUd6378snt7hAB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3016 wrote to memory of 4948 3016 rundll32.exe 80 PID 3016 wrote to memory of 4948 3016 rundll32.exe 80 PID 3016 wrote to memory of 4948 3016 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0f59dfb1df4d43e68b5a5de21b0f6760537d932dd694d3b4c7af2dfd4574887.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0f59dfb1df4d43e68b5a5de21b0f6760537d932dd694d3b4c7af2dfd4574887.dll,#12⤵PID:4948
-