Analysis
-
max time kernel
197s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
c8d26633d552f39a720bfee6f78534fafcc30c535656dc7115ec8d98101e7e82.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c8d26633d552f39a720bfee6f78534fafcc30c535656dc7115ec8d98101e7e82.dll
Resource
win10v2004-20221111-en
General
-
Target
c8d26633d552f39a720bfee6f78534fafcc30c535656dc7115ec8d98101e7e82.dll
-
Size
9KB
-
MD5
0930c10a47f97b9251ee516977fe5d0f
-
SHA1
b5b380334d7029c53091d143a0af7bd4eb51572e
-
SHA256
c8d26633d552f39a720bfee6f78534fafcc30c535656dc7115ec8d98101e7e82
-
SHA512
8bd817480300ae380ab6b641f30596fc9956818d27cdcac07c401d43fd9e459b7fd81eb82128d812e91075da43d074b28813d1b5042926f314cd8d264b0306ed
-
SSDEEP
96:fpPeYuWU3rZY2/pb7iYpWW2H3Fe4jx0coPwG/YFNCUkfYL8XCBwN+EEGJLRD:BPep3dtaYpx2H3Fe4jxIPwG/Yz5SN
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3332 wrote to memory of 3580 3332 rundll32.exe 84 PID 3332 wrote to memory of 3580 3332 rundll32.exe 84 PID 3332 wrote to memory of 3580 3332 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8d26633d552f39a720bfee6f78534fafcc30c535656dc7115ec8d98101e7e82.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8d26633d552f39a720bfee6f78534fafcc30c535656dc7115ec8d98101e7e82.dll,#12⤵PID:3580
-