Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 22:28
Static task
static1
Behavioral task
behavioral1
Sample
b95631a49f5f6efe4a7c70f304c544940cf662bbffc98cd364faf15a4ed0f4c8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b95631a49f5f6efe4a7c70f304c544940cf662bbffc98cd364faf15a4ed0f4c8.dll
Resource
win10v2004-20220812-en
General
-
Target
b95631a49f5f6efe4a7c70f304c544940cf662bbffc98cd364faf15a4ed0f4c8.dll
-
Size
6KB
-
MD5
6f08249dea25e5ed24ab828fffe5cf60
-
SHA1
360ce3a710af27ac1669df2d255af14682499cb3
-
SHA256
b95631a49f5f6efe4a7c70f304c544940cf662bbffc98cd364faf15a4ed0f4c8
-
SHA512
93b803656543a150e8c2a4b090e58cbf666573740a27f7e0eb191b4ed19e9780b0702abc67e606ff1b4f28f0d524fcd04a0bb80d9853e394d6ab80475eebd9d8
-
SSDEEP
96:nI2RrUeqr8Ur4zhHUZDumcc4+yJHQjJgnSVizGHLQr:XR4e0r4zWumZfQH4gWHL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 1140 4572 rundll32.exe 80 PID 4572 wrote to memory of 1140 4572 rundll32.exe 80 PID 4572 wrote to memory of 1140 4572 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b95631a49f5f6efe4a7c70f304c544940cf662bbffc98cd364faf15a4ed0f4c8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b95631a49f5f6efe4a7c70f304c544940cf662bbffc98cd364faf15a4ed0f4c8.dll,#12⤵PID:1140
-