Analysis
-
max time kernel
291s -
max time network
339s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
fa1ebf0e7ab8cb6fd5fbda4a7b422d6ba9ccf9aaea5693fedd1728d4546c0f2d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fa1ebf0e7ab8cb6fd5fbda4a7b422d6ba9ccf9aaea5693fedd1728d4546c0f2d.dll
Resource
win10v2004-20221111-en
General
-
Target
fa1ebf0e7ab8cb6fd5fbda4a7b422d6ba9ccf9aaea5693fedd1728d4546c0f2d.dll
-
Size
32KB
-
MD5
841fbad1c052e9b0dcd359f870e07ca0
-
SHA1
e79dbcb7e41a55bb3e5b76fbce07a580ede07d5c
-
SHA256
fa1ebf0e7ab8cb6fd5fbda4a7b422d6ba9ccf9aaea5693fedd1728d4546c0f2d
-
SHA512
702f3d7cdd8f8327f29f532515e4b442a98c8c2662f928ff3a4a22f3ac3d2a940d8028294a31ea12f8384ae8b4b19d171aeb7394d8fb6df3e2a52e94d4c27e73
-
SSDEEP
768:7gVyye/Iia6GppW4Q/5T72ZafTOpShVDERJ9JX:7gVS/tspqR72Za7nHQRHV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 32 wrote to memory of 2112 32 rundll32.exe 77 PID 32 wrote to memory of 2112 32 rundll32.exe 77 PID 32 wrote to memory of 2112 32 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa1ebf0e7ab8cb6fd5fbda4a7b422d6ba9ccf9aaea5693fedd1728d4546c0f2d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa1ebf0e7ab8cb6fd5fbda4a7b422d6ba9ccf9aaea5693fedd1728d4546c0f2d.dll,#12⤵PID:2112
-