Analysis
-
max time kernel
91s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
17c3fc60847f709ccad1170598754d8d718dfd74259f4ef2248126b5d9221f41.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17c3fc60847f709ccad1170598754d8d718dfd74259f4ef2248126b5d9221f41.dll
Resource
win10v2004-20220812-en
General
-
Target
17c3fc60847f709ccad1170598754d8d718dfd74259f4ef2248126b5d9221f41.dll
-
Size
244KB
-
MD5
04b5ad27aea880f1b42cfc1c3d8db090
-
SHA1
550c9d43a6c5fcef377057bc16ceff164f50e40b
-
SHA256
17c3fc60847f709ccad1170598754d8d718dfd74259f4ef2248126b5d9221f41
-
SHA512
d02278f9818c65c4da39ca909a464534b63a5815a0a0d9401e0f86a802db08588d8ad8ce0efa296e145ea2c5d6193b4a311c565c8f37fddfadb72157f6d10b19
-
SSDEEP
768:kiVSPiFnFaRvuHQY1orkv6C+AqPo7F2szijPBBQARQkolWtNp:pS4aEHQax2szijPBBQAR9N
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 3052 4684 rundll32.exe 78 PID 4684 wrote to memory of 3052 4684 rundll32.exe 78 PID 4684 wrote to memory of 3052 4684 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17c3fc60847f709ccad1170598754d8d718dfd74259f4ef2248126b5d9221f41.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17c3fc60847f709ccad1170598754d8d718dfd74259f4ef2248126b5d9221f41.dll,#12⤵PID:3052
-