Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
720f75302f0aba32b509359ee8dcd0f3491f67065b28e4f798b2adcfa6e71074.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
720f75302f0aba32b509359ee8dcd0f3491f67065b28e4f798b2adcfa6e71074.dll
Resource
win10v2004-20220812-en
General
-
Target
720f75302f0aba32b509359ee8dcd0f3491f67065b28e4f798b2adcfa6e71074.dll
-
Size
6KB
-
MD5
1db4e6d0f1b6ef39eebad0d9cdcf0ba0
-
SHA1
470164f448fb25d495dbe3ecd14a2dc8ce44a8f1
-
SHA256
720f75302f0aba32b509359ee8dcd0f3491f67065b28e4f798b2adcfa6e71074
-
SHA512
da07f4933f96903c3a8a6ba706bc84c5a32066e70e86c5cd086a165f3be91f4d210754fd3e1a9d380879a8c018f94dd8fe4a506dc42aad2d6dc7af895badfd6d
-
SSDEEP
96:juNrYuJ59oAwGQUI/TQahtCl8X3pSHnmnD7HB7/:juLJ/oAdQPQa2aeng7h7/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4996 wrote to memory of 1840 4996 rundll32.exe 81 PID 4996 wrote to memory of 1840 4996 rundll32.exe 81 PID 4996 wrote to memory of 1840 4996 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\720f75302f0aba32b509359ee8dcd0f3491f67065b28e4f798b2adcfa6e71074.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\720f75302f0aba32b509359ee8dcd0f3491f67065b28e4f798b2adcfa6e71074.dll,#12⤵PID:1840
-