Analysis
-
max time kernel
159s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
c6ba44af70cc7af3edbb47bf28114bfccd21aa83cb65a033831d91d857a0cc93.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c6ba44af70cc7af3edbb47bf28114bfccd21aa83cb65a033831d91d857a0cc93.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
c6ba44af70cc7af3edbb47bf28114bfccd21aa83cb65a033831d91d857a0cc93.dll
-
Size
62KB
-
MD5
b3ae737c13fdcfb0ba51ad62e9110950
-
SHA1
20e6c0f741edf3089ac5eb0b3ac3d9ca2a78470e
-
SHA256
c6ba44af70cc7af3edbb47bf28114bfccd21aa83cb65a033831d91d857a0cc93
-
SHA512
0abf799cb757eee3328b506950c4a7a5237641e57ea79bc6a0468f2cbeffa7caeac69c2c0c69f65d0305b7f568ab911ce761f223a9cecd09afc817d922ea81cb
-
SSDEEP
1536:Fresl3oLo8IfhocEKp/nUCR7p153/j8DZ:PlQahoctUe735b8DZ
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4804-137-0x00000000009B0000-0x00000000009BE000-memory.dmp upx behavioral2/memory/4804-136-0x00000000009B0000-0x00000000009BE000-memory.dmp upx behavioral2/memory/4804-133-0x00000000009B0000-0x00000000009BE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2052 wrote to memory of 4804 2052 rundll32.exe 80 PID 2052 wrote to memory of 4804 2052 rundll32.exe 80 PID 2052 wrote to memory of 4804 2052 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6ba44af70cc7af3edbb47bf28114bfccd21aa83cb65a033831d91d857a0cc93.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6ba44af70cc7af3edbb47bf28114bfccd21aa83cb65a033831d91d857a0cc93.dll,#12⤵PID:4804
-