Analysis
-
max time kernel
255s -
max time network
272s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 18:49
Static task
static1
Behavioral task
behavioral1
Sample
89ae02412e202731578368583f4b61a4e50fa1851378d21bbe24aa3aa2eb0a38.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89ae02412e202731578368583f4b61a4e50fa1851378d21bbe24aa3aa2eb0a38.dll
Resource
win10v2004-20221111-en
General
-
Target
89ae02412e202731578368583f4b61a4e50fa1851378d21bbe24aa3aa2eb0a38.dll
-
Size
124KB
-
MD5
7f40640134e0c7ed1c15336e115e537c
-
SHA1
e75b9a36cb5a1bd19eb46998396c1de7d0adacb7
-
SHA256
89ae02412e202731578368583f4b61a4e50fa1851378d21bbe24aa3aa2eb0a38
-
SHA512
699ff5c89b2b516e3b4388688c00df4eb21e7d7d37ceb2491c0209942189ae15872a3d9703a070db16d5e6adc98252b64c1dffee0449ec62c5b1db0ca107aa27
-
SSDEEP
3072:Yuvyc/0Dll6S3R/dVwBEcnx7HFUGmeo2Xe1:Yux/j2/zIEcnx7lUGS2Xe1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1276 4536 rundll32.exe 81 PID 4536 wrote to memory of 1276 4536 rundll32.exe 81 PID 4536 wrote to memory of 1276 4536 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89ae02412e202731578368583f4b61a4e50fa1851378d21bbe24aa3aa2eb0a38.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89ae02412e202731578368583f4b61a4e50fa1851378d21bbe24aa3aa2eb0a38.dll,#12⤵PID:1276
-