Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 04:28
Static task
static1
Behavioral task
behavioral1
Sample
c0b906019a8cdf63bb1f3ab46666dfbee0d69dbff02c3bc958a891d106c0963d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0b906019a8cdf63bb1f3ab46666dfbee0d69dbff02c3bc958a891d106c0963d.dll
Resource
win10v2004-20220812-en
General
-
Target
c0b906019a8cdf63bb1f3ab46666dfbee0d69dbff02c3bc958a891d106c0963d.dll
-
Size
32KB
-
MD5
44b5399124cbbd4fa89e388264e7bfb4
-
SHA1
87bac60721a281bd6b2c1d73cde1b670e555ef54
-
SHA256
c0b906019a8cdf63bb1f3ab46666dfbee0d69dbff02c3bc958a891d106c0963d
-
SHA512
d981b6cba901ca0d27164148807087e3980be335a5a53d3c3a7b2c0bb92fb9f5eb9ffdf16d397aa480034bbb2719a07b30f3ef577915442c94b727b99dc20204
-
SSDEEP
384:Zpuj39NfuKDQ/BFgbpoVCl8zjOvyzJW77+1O+qXSQG9aFJFrRCRNYY4p:Xujru/O2Ml8zCSW7ADMSZ96BURNYYk
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4700 wrote to memory of 3876 4700 rundll32.exe 82 PID 4700 wrote to memory of 3876 4700 rundll32.exe 82 PID 4700 wrote to memory of 3876 4700 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0b906019a8cdf63bb1f3ab46666dfbee0d69dbff02c3bc958a891d106c0963d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0b906019a8cdf63bb1f3ab46666dfbee0d69dbff02c3bc958a891d106c0963d.dll,#12⤵PID:3876
-