Analysis
-
max time kernel
185s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
1990669cb85a764df7451d78435a97ebbbfcadd36d4977e516c85d1490158df5.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1990669cb85a764df7451d78435a97ebbbfcadd36d4977e516c85d1490158df5.dll
Resource
win10v2004-20221111-en
General
-
Target
1990669cb85a764df7451d78435a97ebbbfcadd36d4977e516c85d1490158df5.dll
-
Size
6KB
-
MD5
ece3670d8b95b073bfc2e4c73cfc8b10
-
SHA1
7b426620ac0089be400d194cae6240c97eced5fb
-
SHA256
1990669cb85a764df7451d78435a97ebbbfcadd36d4977e516c85d1490158df5
-
SHA512
5c941c906f4e57b998dcbfa0d099f303a1f0e82d12bb0419a8d85f4877c01fda8cdb6fb5cae7189dc99ff85f41c4cd14c6e122c7734cdd8cf49271794ddebc15
-
SSDEEP
96:juNrYuJ59oAwGQUI/TQahtCl8X3pSHnmnD7TZ4g:juLJ/oAdQPQa2aeng7TX
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1460 wrote to memory of 224 1460 rundll32.exe 83 PID 1460 wrote to memory of 224 1460 rundll32.exe 83 PID 1460 wrote to memory of 224 1460 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1990669cb85a764df7451d78435a97ebbbfcadd36d4977e516c85d1490158df5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1990669cb85a764df7451d78435a97ebbbfcadd36d4977e516c85d1490158df5.dll,#12⤵PID:224
-