Analysis
-
max time kernel
110s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 06:24
Static task
static1
Behavioral task
behavioral1
Sample
9929b8e4edbdb8629104966446a2b8eae667bf2d42933c04500ac5025fded5b6.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9929b8e4edbdb8629104966446a2b8eae667bf2d42933c04500ac5025fded5b6.dll
Resource
win10v2004-20220901-en
General
-
Target
9929b8e4edbdb8629104966446a2b8eae667bf2d42933c04500ac5025fded5b6.dll
-
Size
216KB
-
MD5
84ffda35f0840067da61ac5037052562
-
SHA1
1d94b2ecac03aa64a4b1047597c7ec35a8545ae7
-
SHA256
9929b8e4edbdb8629104966446a2b8eae667bf2d42933c04500ac5025fded5b6
-
SHA512
a09bb8b0c36a9d00d7e6ad1e32a91093dfbff6c5a1591cd7b3dc8f922f6a2be788d70bdafecc9c8ddbee5bb96eb55d751111a175f718ae6150f560a7293973a9
-
SSDEEP
6144:Vw/XOOZx1AINv3TV9Z3IEVLKvdSyucWTBogiYz9UP1:yTAINv3bXKlS1cWTe9KqP
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3912 4764 rundll32.exe 81 PID 4764 wrote to memory of 3912 4764 rundll32.exe 81 PID 4764 wrote to memory of 3912 4764 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9929b8e4edbdb8629104966446a2b8eae667bf2d42933c04500ac5025fded5b6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9929b8e4edbdb8629104966446a2b8eae667bf2d42933c04500ac5025fded5b6.dll,#12⤵PID:3912
-