Analysis
-
max time kernel
91s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 11:04
Static task
static1
Behavioral task
behavioral1
Sample
d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b.dll
Resource
win10v2004-20220901-en
General
-
Target
d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b.dll
-
Size
103KB
-
MD5
3246ac50a414808ead31738c7351e3b1
-
SHA1
a6cb3aecce1bd8335937ef08299773535bb5bd2e
-
SHA256
d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b
-
SHA512
35d19ecce41c50ae8cde002b43351fde976e1ea99288483c01993efe91810fe4596a8f2a0260f6d38d302314f6afd2a8c47437ad6a69ea55b6bc93e47c234fb2
-
SSDEEP
1536:m3Tp2Pw5jF2GjG/t9fL1r77opkt2AuTbe7dLa6qGDJ9UyV7rXSBk:o0Pw5YGjG19fp7Rt2x/ONqGDXUyVPSB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4844 4752 rundll32.exe 21 PID 4752 wrote to memory of 4844 4752 rundll32.exe 21 PID 4752 wrote to memory of 4844 4752 rundll32.exe 21
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d514d3601ac2652bdba9b47232c2392f3e739585ef7139f32cd1954606f6ae3b.dll,#12⤵PID:4844
-