Analysis
-
max time kernel
147s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
5b64e0dd7f7f302a6848096b24f2b37512b00f90269697e152afa29f6ae320b1.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b64e0dd7f7f302a6848096b24f2b37512b00f90269697e152afa29f6ae320b1.dll
Resource
win10v2004-20220812-en
General
-
Target
5b64e0dd7f7f302a6848096b24f2b37512b00f90269697e152afa29f6ae320b1.dll
-
Size
7KB
-
MD5
04476f466b0807420cd5fbc91dba7c60
-
SHA1
7fdd3132f9628f458060f1f8e24680087dee7a56
-
SHA256
5b64e0dd7f7f302a6848096b24f2b37512b00f90269697e152afa29f6ae320b1
-
SHA512
f69200bec5f3062ffb67485d2ee55912ada00f775eba5bc6c28ecbf1654daee96b2d7b4281079584e1c889416bfabd1ccb187bbe4f2c3040ed904e547a8dce13
-
SSDEEP
96:nGTKrYJyJ5gT9jXk9eXWI/n9e1r/CVd7p0jsnmUD7orrQ4d:nGTWJGp0UZUd6378snt7of
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4708 4820 rundll32.exe 81 PID 4820 wrote to memory of 4708 4820 rundll32.exe 81 PID 4820 wrote to memory of 4708 4820 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b64e0dd7f7f302a6848096b24f2b37512b00f90269697e152afa29f6ae320b1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b64e0dd7f7f302a6848096b24f2b37512b00f90269697e152afa29f6ae320b1.dll,#12⤵PID:4708
-