Analysis
-
max time kernel
168s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 22:49
Static task
static1
Behavioral task
behavioral1
Sample
d11054e3446e95f3cfa4e3cff1324dbbceea8261f682f6df1f1ce33dc80c62ae.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d11054e3446e95f3cfa4e3cff1324dbbceea8261f682f6df1f1ce33dc80c62ae.dll
Resource
win10v2004-20220812-en
General
-
Target
d11054e3446e95f3cfa4e3cff1324dbbceea8261f682f6df1f1ce33dc80c62ae.dll
-
Size
20KB
-
MD5
b8dc08e1e06c30cecc34a9e3a522d82f
-
SHA1
8bb3c687f0beffa97c3984124356e85dcbb34ae2
-
SHA256
d11054e3446e95f3cfa4e3cff1324dbbceea8261f682f6df1f1ce33dc80c62ae
-
SHA512
f3aca3e40cad555ceb469ee42bfabc8b7bfe4a15ab016a2945cd3914d0a3d4b251ead76ea2cdc46b0dbaf3fc8344f0e28a3ca89b8878a401a0762fc1d8f8b8ad
-
SSDEEP
384:+BwmSQ73afF310PqTxDmdYu1XG7N+Z2hqCQOol/X99973bHmSzfmrWi+RdW:+OQOFFWqlE63h/kLZz7R
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3108 wrote to memory of 380 3108 rundll32.exe 80 PID 3108 wrote to memory of 380 3108 rundll32.exe 80 PID 3108 wrote to memory of 380 3108 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d11054e3446e95f3cfa4e3cff1324dbbceea8261f682f6df1f1ce33dc80c62ae.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d11054e3446e95f3cfa4e3cff1324dbbceea8261f682f6df1f1ce33dc80c62ae.dll,#12⤵PID:380
-