Analysis
-
max time kernel
150s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 01:57
Static task
static1
Behavioral task
behavioral1
Sample
beb25ec0680e502d7d3f8095aac729a5b2f150936cbbfeaca620328307e99102.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
beb25ec0680e502d7d3f8095aac729a5b2f150936cbbfeaca620328307e99102.dll
Resource
win10v2004-20220812-en
General
-
Target
beb25ec0680e502d7d3f8095aac729a5b2f150936cbbfeaca620328307e99102.dll
-
Size
156KB
-
MD5
9df357a1541fcb195ff01721199f4790
-
SHA1
c55dcced6c5f22f5cdbe699b7b259929778a1799
-
SHA256
beb25ec0680e502d7d3f8095aac729a5b2f150936cbbfeaca620328307e99102
-
SHA512
c2aa2ef297200fe111492487165460fafa34d121bf3b105948edfc149d3708066e37cd48503db6f1ea648f67bb629de16853a9b84f397269657409adbdd6953b
-
SSDEEP
3072:skzNwyLv/ENXtvXWqHXuvx0d8HfhVfB7QWKokRMgVteByl:skz28WWq3U/B0ZMgGB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3896 3992 rundll32.exe 79 PID 3992 wrote to memory of 3896 3992 rundll32.exe 79 PID 3992 wrote to memory of 3896 3992 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\beb25ec0680e502d7d3f8095aac729a5b2f150936cbbfeaca620328307e99102.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\beb25ec0680e502d7d3f8095aac729a5b2f150936cbbfeaca620328307e99102.dll,#12⤵PID:3896
-