Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
f65e862b97f3a9ed3670274765bab60d115cd2570fc133d0b7fea1e5fe0e97fa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f65e862b97f3a9ed3670274765bab60d115cd2570fc133d0b7fea1e5fe0e97fa.dll
Resource
win10v2004-20220812-en
General
-
Target
f65e862b97f3a9ed3670274765bab60d115cd2570fc133d0b7fea1e5fe0e97fa.dll
-
Size
40KB
-
MD5
f57651e0a06a250c69dadcef303327f0
-
SHA1
00788818870312b431f4c3cdab5317df42bc0d3c
-
SHA256
f65e862b97f3a9ed3670274765bab60d115cd2570fc133d0b7fea1e5fe0e97fa
-
SHA512
45b8d1e3a3e2292f59f5e81a6ca12bdd608cb5bbc6ce36fa019e8c6e228a116af5e6b5c50d585b974d494c4e81bebe3b6a14deedfa174ab54334f958ee22e2e8
-
SSDEEP
384:Xz2yEZGNDonbKiTTV+c7DQe+TA2Vf0DlXjyA9YhxH09mTuTWKkpWafreACV:XiyEZ8+WagECA2+DlXjyAahdSMJreAE
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 2152 5060 rundll32.exe 82 PID 5060 wrote to memory of 2152 5060 rundll32.exe 82 PID 5060 wrote to memory of 2152 5060 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f65e862b97f3a9ed3670274765bab60d115cd2570fc133d0b7fea1e5fe0e97fa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f65e862b97f3a9ed3670274765bab60d115cd2570fc133d0b7fea1e5fe0e97fa.dll,#12⤵PID:2152
-