Analysis
-
max time kernel
189s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 21:44
Static task
static1
Behavioral task
behavioral1
Sample
f26b460ef24d9778ca716cc5a09733aa1e767ec0f036b09d35a22ae9df42dcf1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f26b460ef24d9778ca716cc5a09733aa1e767ec0f036b09d35a22ae9df42dcf1.dll
Resource
win10v2004-20221111-en
General
-
Target
f26b460ef24d9778ca716cc5a09733aa1e767ec0f036b09d35a22ae9df42dcf1.dll
-
Size
6KB
-
MD5
9ff22781d66830de1366eb1a77979ae0
-
SHA1
15e85ee7ca96d1cdceb7eb5a9ef7b189286980ca
-
SHA256
f26b460ef24d9778ca716cc5a09733aa1e767ec0f036b09d35a22ae9df42dcf1
-
SHA512
bf604b042d04bc1e8879383949f8331a666c06f0397786f2fd9c3b7a80f6a9879fc98c78e3ae797166cd87897a7b52d22c23b42004deed2c4a39e39f99c321ce
-
SSDEEP
96:nEY2RrF1eqwi4048ziVek/Io1sLoj5rjJjbYRBXxhk:EHRh1epp0xiuo1sLSlfEBh
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1420 wrote to memory of 740 1420 rundll32.exe 82 PID 1420 wrote to memory of 740 1420 rundll32.exe 82 PID 1420 wrote to memory of 740 1420 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f26b460ef24d9778ca716cc5a09733aa1e767ec0f036b09d35a22ae9df42dcf1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f26b460ef24d9778ca716cc5a09733aa1e767ec0f036b09d35a22ae9df42dcf1.dll,#12⤵PID:740
-