Analysis
-
max time kernel
365s -
max time network
434s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
d080867806b0837c522387689f6d67967166a959fd077103d2fbf30be31a5988.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d080867806b0837c522387689f6d67967166a959fd077103d2fbf30be31a5988.dll
Resource
win10v2004-20221111-en
General
-
Target
d080867806b0837c522387689f6d67967166a959fd077103d2fbf30be31a5988.dll
-
Size
4KB
-
MD5
2f80f8bf5e1f83f9ae5b0aae334ce5d0
-
SHA1
ecb3a4aee6175f6eb5feec3f33fdcb196f409d20
-
SHA256
d080867806b0837c522387689f6d67967166a959fd077103d2fbf30be31a5988
-
SHA512
d2a07f04ba51df2f9c3b5cd280ac2d37021f511f186cb05b017447b42160f6cdd57e6e88c1d1e59a94d03b0bb315e607963e1869416fa1120161f3da502f69a1
-
SSDEEP
48:qHupGeMcCB96DrhWHR0FiIsipZlM+u+eAPMDQHpyuLv6omGejvGXZ3tv:PMXB0rw0MI/pwbdkP
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1260 wrote to memory of 964 1260 rundll32.exe 79 PID 1260 wrote to memory of 964 1260 rundll32.exe 79 PID 1260 wrote to memory of 964 1260 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d080867806b0837c522387689f6d67967166a959fd077103d2fbf30be31a5988.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d080867806b0837c522387689f6d67967166a959fd077103d2fbf30be31a5988.dll,#12⤵PID:964
-