Analysis
-
max time kernel
144s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
90ea2a38c6049b857cadd5b56d0177eaf7dddf3c057968e4557bda3a52c67b7a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90ea2a38c6049b857cadd5b56d0177eaf7dddf3c057968e4557bda3a52c67b7a.dll
Resource
win10v2004-20220812-en
General
-
Target
90ea2a38c6049b857cadd5b56d0177eaf7dddf3c057968e4557bda3a52c67b7a.dll
-
Size
37KB
-
MD5
dd25ecab48010982d87fdd724000ccc0
-
SHA1
d4284d1c8c048c5772dd7f5412f6d0a5c84550b2
-
SHA256
90ea2a38c6049b857cadd5b56d0177eaf7dddf3c057968e4557bda3a52c67b7a
-
SHA512
b7078076ec6674862fc9f2d7f7708a8b3941a61b31463b7186e806632d5c27f9970b4fe2a6d3972737ba0c1fa217f4642666b56e0b0873b145caf5e9e33aa161
-
SSDEEP
768:w2y0bxzekBl7g8P6cxpyGFOD81IGbDE30fVJf6rPiW1acX6h:A0b9d/i4nFO0M30fVJirk
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3952 wrote to memory of 380 3952 rundll32.exe 81 PID 3952 wrote to memory of 380 3952 rundll32.exe 81 PID 3952 wrote to memory of 380 3952 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90ea2a38c6049b857cadd5b56d0177eaf7dddf3c057968e4557bda3a52c67b7a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90ea2a38c6049b857cadd5b56d0177eaf7dddf3c057968e4557bda3a52c67b7a.dll,#12⤵PID:380
-