Analysis
-
max time kernel
90s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 00:24
Static task
static1
Behavioral task
behavioral1
Sample
bafb43cc8dfe5862aada8bf7fa165299a49da6435d7727d08601953da5d93f3f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bafb43cc8dfe5862aada8bf7fa165299a49da6435d7727d08601953da5d93f3f.dll
Resource
win10v2004-20220812-en
General
-
Target
bafb43cc8dfe5862aada8bf7fa165299a49da6435d7727d08601953da5d93f3f.dll
-
Size
80KB
-
MD5
70584adef3919b9de071aa328dcc641a
-
SHA1
b8ec8da2992478970441e5c3904b1b724e7e9913
-
SHA256
bafb43cc8dfe5862aada8bf7fa165299a49da6435d7727d08601953da5d93f3f
-
SHA512
8cc6671b820eba3a2ecddf2c107fa8757cbc5c9e065370425f0cb67af173ccb960d1917f10ebc786696f1246bbec52e0aea4d9e2da3e0690ee7296e177bd8e9c
-
SSDEEP
1536:udglDWTM3naVCfq34NbPfrH4YlE+q82effswmtlhH9enoeHM/qpypjcXO:uKlCTM3nWoFPfrHg+4efkfhH9mLHDpy5
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4756 wrote to memory of 4656 4756 rundll32.exe 79 PID 4756 wrote to memory of 4656 4756 rundll32.exe 79 PID 4756 wrote to memory of 4656 4756 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bafb43cc8dfe5862aada8bf7fa165299a49da6435d7727d08601953da5d93f3f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bafb43cc8dfe5862aada8bf7fa165299a49da6435d7727d08601953da5d93f3f.dll,#12⤵PID:4656
-