Analysis
-
max time kernel
201s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
f7fd1d6d4239f30266625768e66210ced8699ebee44abe9784195ad6a5996f94.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7fd1d6d4239f30266625768e66210ced8699ebee44abe9784195ad6a5996f94.dll
Resource
win10v2004-20221111-en
General
-
Target
f7fd1d6d4239f30266625768e66210ced8699ebee44abe9784195ad6a5996f94.dll
-
Size
33KB
-
MD5
86e141f767b833b2acc1a20ce33c1fa0
-
SHA1
64f6a16ff9ca62ca4a60be26d2d72cb5e2b7a7dd
-
SHA256
f7fd1d6d4239f30266625768e66210ced8699ebee44abe9784195ad6a5996f94
-
SHA512
044afeb665f5c63c1691f2275f1bdf70e0404b2d915f48bdc13e95e5902d13159b9b00f68bd2889ad66c2c6b1c7d5691cefd79f1cfab9d71dcdbf88eaa92a641
-
SSDEEP
768:FWPYvZLnZ0icDVov3Yq7pW/PB7cOkRERz8ckt:cPYvZLnUVOb7pW/GLERz8cS
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3352 wrote to memory of 4348 3352 rundll32.exe 84 PID 3352 wrote to memory of 4348 3352 rundll32.exe 84 PID 3352 wrote to memory of 4348 3352 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7fd1d6d4239f30266625768e66210ced8699ebee44abe9784195ad6a5996f94.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7fd1d6d4239f30266625768e66210ced8699ebee44abe9784195ad6a5996f94.dll,#12⤵PID:4348
-