Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
67b8c4fe0a9c835218478b6452a913479966f46984ddc3693908652a0919c45e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
67b8c4fe0a9c835218478b6452a913479966f46984ddc3693908652a0919c45e.dll
Resource
win10v2004-20220812-en
General
-
Target
67b8c4fe0a9c835218478b6452a913479966f46984ddc3693908652a0919c45e.dll
-
Size
34KB
-
MD5
36932168a3fa4936890922d1ce5be610
-
SHA1
81985269b2efe128a6c511645c1beac76cd1e4b9
-
SHA256
67b8c4fe0a9c835218478b6452a913479966f46984ddc3693908652a0919c45e
-
SHA512
87652d0a5e9781c054a69add689006ed2a75d5a446fe90e71acafc3c0485a9e76ca730b1becd1e3decba5921c9c354905e94ee19e97c063c57c0c1bfd24c3c7f
-
SSDEEP
768:HQg1pmTl4azOpupJHNr7rOppFbOOJLd2RIoqW:wg1pmTlJMup7rOpDPR2RIoqW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1436 wrote to memory of 5068 1436 rundll32.exe 80 PID 1436 wrote to memory of 5068 1436 rundll32.exe 80 PID 1436 wrote to memory of 5068 1436 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67b8c4fe0a9c835218478b6452a913479966f46984ddc3693908652a0919c45e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67b8c4fe0a9c835218478b6452a913479966f46984ddc3693908652a0919c45e.dll,#12⤵PID:5068
-