Analysis
-
max time kernel
162s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 03:59
Static task
static1
Behavioral task
behavioral1
Sample
d79d67b24798de1399945bd908f6e4ebc05aff23c5972460fb4a8582fc5a74e0.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d79d67b24798de1399945bd908f6e4ebc05aff23c5972460fb4a8582fc5a74e0.dll
Resource
win10v2004-20221111-en
General
-
Target
d79d67b24798de1399945bd908f6e4ebc05aff23c5972460fb4a8582fc5a74e0.dll
-
Size
628KB
-
MD5
181490c62f894b298a46f0a980b5de90
-
SHA1
4811e3c5456356faac220ab79c1a69d787640709
-
SHA256
d79d67b24798de1399945bd908f6e4ebc05aff23c5972460fb4a8582fc5a74e0
-
SHA512
64d68bd245e6dcfeb9fab0db035fac7578454437f4435daa66d0a6a508bcf6cbbc5ec3d8b4c3eab60a513d8d5527620360cea343731d1a1ce3117f297eecac60
-
SSDEEP
12288:PU2QUJlBnjckbJAs28phVsW8Kp9niWxDZvNEdURC395yyIK0whq8Iv:PmCWOPVQ9WxDZSdwCniwBIv
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 1124 4796 rundll32.exe 83 PID 4796 wrote to memory of 1124 4796 rundll32.exe 83 PID 4796 wrote to memory of 1124 4796 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d79d67b24798de1399945bd908f6e4ebc05aff23c5972460fb4a8582fc5a74e0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d79d67b24798de1399945bd908f6e4ebc05aff23c5972460fb4a8582fc5a74e0.dll,#12⤵PID:1124
-