Analysis
-
max time kernel
187s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
8be7eb2bba35249c2793fcb24ecc1820a275f5f040bf4c9ab5d1ba5aa9ca030d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8be7eb2bba35249c2793fcb24ecc1820a275f5f040bf4c9ab5d1ba5aa9ca030d.dll
Resource
win10v2004-20221111-en
General
-
Target
8be7eb2bba35249c2793fcb24ecc1820a275f5f040bf4c9ab5d1ba5aa9ca030d.dll
-
Size
153KB
-
MD5
3d4bf61b1654745944028237fd1f50f6
-
SHA1
fbb1feec54e37efbbc8763df129a754b3795b5eb
-
SHA256
8be7eb2bba35249c2793fcb24ecc1820a275f5f040bf4c9ab5d1ba5aa9ca030d
-
SHA512
e0947903e6dc2e607da7912a7cdfd6309c2f5758387ac7dc9fc3c4afe97e4c19799b6f19aedf24ea0c4a7094155c4374dbf4bb0bb70a61ae9c963f219f551c63
-
SSDEEP
3072:Szrv/FbiExFnnnFIfvDZwY9QhDfqcleoeA4MjIqHa6XYNq6MqqDa/I1sEAv++C:SzrvJbFjBfU4HaLYqqDGI1rK
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3108 wrote to memory of 1180 3108 rundll32.exe 81 PID 3108 wrote to memory of 1180 3108 rundll32.exe 81 PID 3108 wrote to memory of 1180 3108 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8be7eb2bba35249c2793fcb24ecc1820a275f5f040bf4c9ab5d1ba5aa9ca030d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8be7eb2bba35249c2793fcb24ecc1820a275f5f040bf4c9ab5d1ba5aa9ca030d.dll,#12⤵PID:1180
-