Analysis
-
max time kernel
141s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 22:24
Static task
static1
Behavioral task
behavioral1
Sample
c2481a0adfb4641d1f1bc319167f4a2d685a97f9b1f93905af7f0ef0e7943a2f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2481a0adfb4641d1f1bc319167f4a2d685a97f9b1f93905af7f0ef0e7943a2f.dll
Resource
win10v2004-20220812-en
General
-
Target
c2481a0adfb4641d1f1bc319167f4a2d685a97f9b1f93905af7f0ef0e7943a2f.dll
-
Size
8KB
-
MD5
e527f3d90ad3662a5ab54e2d35c08f40
-
SHA1
4ce7f983cdffb02f08adc3452ffc2f2aa2768c60
-
SHA256
c2481a0adfb4641d1f1bc319167f4a2d685a97f9b1f93905af7f0ef0e7943a2f
-
SHA512
23977b147878471387605f7449a7a5d66a27425a7e13181428c4e7dc3418c2aaf3055165f0cf21ae9dc85a923a836a597f1fdf20fa0a4012b488f1b43be2253d
-
SSDEEP
96:FurYVbs15rZ+TMz6ZTHNu2a8+x9G3G1c/YFAWcsKntPKicegl9PM0n2dZlcAt9lJ:F746TMz9BGF/YFAWcs+ZceWZMU69lJ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4720 4748 rundll32.exe 80 PID 4748 wrote to memory of 4720 4748 rundll32.exe 80 PID 4748 wrote to memory of 4720 4748 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2481a0adfb4641d1f1bc319167f4a2d685a97f9b1f93905af7f0ef0e7943a2f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2481a0adfb4641d1f1bc319167f4a2d685a97f9b1f93905af7f0ef0e7943a2f.dll,#12⤵PID:4720
-