Analysis
-
max time kernel
185s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
fc8694a39424f24e080c3769f55b3668791501c4bc93a325113c1fefa3ec2490.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc8694a39424f24e080c3769f55b3668791501c4bc93a325113c1fefa3ec2490.dll
Resource
win10v2004-20221111-en
General
-
Target
fc8694a39424f24e080c3769f55b3668791501c4bc93a325113c1fefa3ec2490.dll
-
Size
7KB
-
MD5
7013a8db6565746d9aba27e3e3388af0
-
SHA1
f332ad2708f24f566ea99c499db5e9536aeec8b1
-
SHA256
fc8694a39424f24e080c3769f55b3668791501c4bc93a325113c1fefa3ec2490
-
SHA512
da26abe35b75dcaef7231e8fd6e2d10ce9406e6fce84561ac5ab071d2c8e380b57b8cdc0a03d74b499a74d30338d8dd633b8abf262941930b158cac14f9632c3
-
SSDEEP
192:unSR6bgY+A+4A+3W+AAkCArZY+BroAZr+A+6WS+I6eA6A+W+AUW+A+AVsvWWA+hQ:uZ+A+4A+3W+AAkCArZY+BroAZr+A+6WO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1940 wrote to memory of 4820 1940 rundll32.exe 81 PID 1940 wrote to memory of 4820 1940 rundll32.exe 81 PID 1940 wrote to memory of 4820 1940 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc8694a39424f24e080c3769f55b3668791501c4bc93a325113c1fefa3ec2490.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc8694a39424f24e080c3769f55b3668791501c4bc93a325113c1fefa3ec2490.dll,#12⤵PID:4820
-