Analysis
-
max time kernel
157s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
2ca9a166ba0155743c764847829508fb898c0d18b396d6e2394b227e559a03f2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ca9a166ba0155743c764847829508fb898c0d18b396d6e2394b227e559a03f2.dll
Resource
win10v2004-20221111-en
General
-
Target
2ca9a166ba0155743c764847829508fb898c0d18b396d6e2394b227e559a03f2.dll
-
Size
156KB
-
MD5
8556329986022688f7749c6145ffad40
-
SHA1
32907c7fd4b7524699290d1be8b1b57b051b145d
-
SHA256
2ca9a166ba0155743c764847829508fb898c0d18b396d6e2394b227e559a03f2
-
SHA512
55c94082c2f67fd99927d2e1b9a861aa621840ffb90f38a05d8652fd5d886988937b9aea8546cf78a7ce5e92c2152b06cf4d935d3ce0d5a85f56cc12bcd3375f
-
SSDEEP
3072:skXNwyLv/ENXtv8JMguzaQ1aR67GOZJvUIo3Hs3l:skX285P7n3OTiql
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3620 wrote to memory of 4540 3620 rundll32.exe 82 PID 3620 wrote to memory of 4540 3620 rundll32.exe 82 PID 3620 wrote to memory of 4540 3620 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ca9a166ba0155743c764847829508fb898c0d18b396d6e2394b227e559a03f2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ca9a166ba0155743c764847829508fb898c0d18b396d6e2394b227e559a03f2.dll,#12⤵PID:4540
-