Analysis
-
max time kernel
189s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
858b710265e03b5ab4c604f3ad9b04f8f05cc9fb1d125f3ddff80d5a7dfc70c5.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
858b710265e03b5ab4c604f3ad9b04f8f05cc9fb1d125f3ddff80d5a7dfc70c5.dll
Resource
win10v2004-20221111-en
General
-
Target
858b710265e03b5ab4c604f3ad9b04f8f05cc9fb1d125f3ddff80d5a7dfc70c5.dll
-
Size
5KB
-
MD5
ce8b04227e2c921e9f4a95756903b860
-
SHA1
dba425f4bde3cf83629478c2026e613bd7e7fbda
-
SHA256
858b710265e03b5ab4c604f3ad9b04f8f05cc9fb1d125f3ddff80d5a7dfc70c5
-
SHA512
e106060851a9c8cdaa41ee7edbbdabac3aae679138575ab8bd33c220d58ce3117654c0452866e26648bd4ec3ac7232e24f62b86d6f519c5a8f1def7f9d764524
-
SSDEEP
96:PT3r2vu9tjsRXZHcgx2TTLP2xR8VTjE01qwlZgVXP0eDWcqX7t00o:Pf220RXZHxwTT72r8l11qwlZgVX8eDWI
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4520 wrote to memory of 4052 4520 rundll32.exe 66 PID 4520 wrote to memory of 4052 4520 rundll32.exe 66 PID 4520 wrote to memory of 4052 4520 rundll32.exe 66
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\858b710265e03b5ab4c604f3ad9b04f8f05cc9fb1d125f3ddff80d5a7dfc70c5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\858b710265e03b5ab4c604f3ad9b04f8f05cc9fb1d125f3ddff80d5a7dfc70c5.dll,#12⤵PID:4052
-