Analysis
-
max time kernel
161s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 03:47
Behavioral task
behavioral1
Sample
14a4212c14e7abbb5109f248ae63e26330e1bb64d77c572e83d45828bc02c07a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14a4212c14e7abbb5109f248ae63e26330e1bb64d77c572e83d45828bc02c07a.dll
Resource
win10v2004-20220812-en
General
-
Target
14a4212c14e7abbb5109f248ae63e26330e1bb64d77c572e83d45828bc02c07a.dll
-
Size
57KB
-
MD5
5c7aa06d81e1e2c2b7517a17f83b928f
-
SHA1
90e67d04302fa95c7448802ceff18af5e3fc940a
-
SHA256
14a4212c14e7abbb5109f248ae63e26330e1bb64d77c572e83d45828bc02c07a
-
SHA512
36a8a454c1d22ea274c0887038073b27d4ed4edf98fc5f17391155563c16b51bc188130feac0616a59b875dbd1d5d6fc589024312822022e61e9804015cd8ca2
-
SSDEEP
768:qz6nzm1b5gNZLLrYV/DZFquDh5+3Q0GT83D1fgmGiT2mDMS+4rGDregfY2VyR1j:qmmMgDyuDr5Rg3ZfgVms4rGnHFyR1j
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4976 4944 rundll32.exe 81 PID 4944 wrote to memory of 4976 4944 rundll32.exe 81 PID 4944 wrote to memory of 4976 4944 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14a4212c14e7abbb5109f248ae63e26330e1bb64d77c572e83d45828bc02c07a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14a4212c14e7abbb5109f248ae63e26330e1bb64d77c572e83d45828bc02c07a.dll,#12⤵PID:4976
-