Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll
Resource
win10v2004-20220901-en
General
-
Target
c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll
-
Size
6KB
-
MD5
e524a2bb032689d9c526241f3a6c1720
-
SHA1
e7c37569eade6a271d163ea269958b6596f83d3f
-
SHA256
c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889
-
SHA512
e2930344cbfc7c9500f96a56b6587d805e80c14a9f8bc3d8cb98bd60b7549a2f05b02c20a5b4f377a952e54eb4bc8f5524ecc83632e1f33dca2f662448dad4f8
-
SSDEEP
48:C6VonAHso6U7lYa92RrpjwDmetlG95hx+iMHh1HIkxG3xE4G9oiU6zy:nEY2RrF1eqwi4jHIkxG3xE4G9oiU6zy
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4316 wrote to memory of 4792 4316 rundll32.exe 81 PID 4316 wrote to memory of 4792 4316 rundll32.exe 81 PID 4316 wrote to memory of 4792 4316 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c480fc103cd46eba355a70f48ccdd948db87a054cb000bf1e4bd30bf9b8f1889.dll,#12⤵PID:4792
-