Analysis
-
max time kernel
122s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 01:27
Static task
static1
Behavioral task
behavioral1
Sample
bddbf5fb0185eab9cb1cff90c7cb01c8f80d4b85e907c38a21ecb333be2ecb5d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bddbf5fb0185eab9cb1cff90c7cb01c8f80d4b85e907c38a21ecb333be2ecb5d.dll
Resource
win10v2004-20220901-en
General
-
Target
bddbf5fb0185eab9cb1cff90c7cb01c8f80d4b85e907c38a21ecb333be2ecb5d.dll
-
Size
134KB
-
MD5
7f7fe1d18ce9ec0628b3fb4714cc119b
-
SHA1
f954d7df35c5fa3ed5ac4a09a123e7fb9d6d13f8
-
SHA256
bddbf5fb0185eab9cb1cff90c7cb01c8f80d4b85e907c38a21ecb333be2ecb5d
-
SHA512
6d9f60ab02d7aa55336a4b8476d590ed04523c0e04a86f91e3dd37496398ef798038e2a5a93a17eae2d8487b2c3c0636f820451bc81a143ce985c59d3f5555ec
-
SSDEEP
1536:LsIuIJkuvfZ/AuwMQvQ+5hd3ebcLViUqSecVuYXKc6nuPK+vp2A0XQpedFPQVHou:4NyxvfG1IgfObdzJdc6nuPKSpxpWUog
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2260 2632 rundll32.exe 81 PID 2632 wrote to memory of 2260 2632 rundll32.exe 81 PID 2632 wrote to memory of 2260 2632 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bddbf5fb0185eab9cb1cff90c7cb01c8f80d4b85e907c38a21ecb333be2ecb5d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bddbf5fb0185eab9cb1cff90c7cb01c8f80d4b85e907c38a21ecb333be2ecb5d.dll,#12⤵PID:2260
-