Analysis
-
max time kernel
209s -
max time network
279s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 05:52
Static task
static1
Behavioral task
behavioral1
Sample
c0e58575503cb8d239e7ece34a78685c2f3532f677f5262273b303dc7d0081e2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0e58575503cb8d239e7ece34a78685c2f3532f677f5262273b303dc7d0081e2.dll
Resource
win10v2004-20221111-en
General
-
Target
c0e58575503cb8d239e7ece34a78685c2f3532f677f5262273b303dc7d0081e2.dll
-
Size
4KB
-
MD5
be7252aaee7df5f47b78cfbc0f5d27d0
-
SHA1
5d177af1da9c92344b5d56ff097ff90b79013174
-
SHA256
c0e58575503cb8d239e7ece34a78685c2f3532f677f5262273b303dc7d0081e2
-
SHA512
9fffeb45c06f8edb5fbcc5257b06eb28c8eeaf0d3d6fdc78c2781a430269d6d48a7eb4b18319a5a6a2ecbaf66c129e3c120699ec6f9a5bc91e3f41fc8a14c1ce
-
SSDEEP
48:iMHGv8j2IcW89NYEArhWHR0MiiIsiI6lXVkqlcH2SuiS6o+mmAkLkZNx:PmkiIz8UZrQ0MhI/ITqlyA9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1860 wrote to memory of 4780 1860 rundll32.exe 82 PID 1860 wrote to memory of 4780 1860 rundll32.exe 82 PID 1860 wrote to memory of 4780 1860 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0e58575503cb8d239e7ece34a78685c2f3532f677f5262273b303dc7d0081e2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0e58575503cb8d239e7ece34a78685c2f3532f677f5262273b303dc7d0081e2.dll,#12⤵PID:4780
-