Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 00:11
Static task
static1
Behavioral task
behavioral1
Sample
f3a48fa19d2f21ddf1c226aaf2825f80fe403132eec31864d21d123691ac89b0.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f3a48fa19d2f21ddf1c226aaf2825f80fe403132eec31864d21d123691ac89b0.dll
Resource
win10v2004-20220812-en
General
-
Target
f3a48fa19d2f21ddf1c226aaf2825f80fe403132eec31864d21d123691ac89b0.dll
-
Size
6KB
-
MD5
d43d71cc8dec3e6d7754997035dd7e70
-
SHA1
8fdee0588f160d9c920483c4247eacc34f3e8aed
-
SHA256
f3a48fa19d2f21ddf1c226aaf2825f80fe403132eec31864d21d123691ac89b0
-
SHA512
087e349dccb2e273607050e442540c1601677d2a7ce5ce2066cb47b89f417d7193b7cc547f653c2d69bd4e3b68a7c00312eef6ac633f244704a69ea2e1588b33
-
SSDEEP
192:PyIIjWXGhqxbKld8coD3z5cNycdC7PRozYQJpa2U:IAxbKld8coD3z5cNycdC7PRozYQJpa2U
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2080 wrote to memory of 908 2080 rundll32.exe 80 PID 2080 wrote to memory of 908 2080 rundll32.exe 80 PID 2080 wrote to memory of 908 2080 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3a48fa19d2f21ddf1c226aaf2825f80fe403132eec31864d21d123691ac89b0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3a48fa19d2f21ddf1c226aaf2825f80fe403132eec31864d21d123691ac89b0.dll,#12⤵PID:908
-