Analysis
-
max time kernel
155s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 06:20
Static task
static1
Behavioral task
behavioral1
Sample
c681f3500cfed68d680eb23eb935f8c0585cd2c79cd1cb57c690a74406043f40.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c681f3500cfed68d680eb23eb935f8c0585cd2c79cd1cb57c690a74406043f40.dll
Resource
win10v2004-20220812-en
General
-
Target
c681f3500cfed68d680eb23eb935f8c0585cd2c79cd1cb57c690a74406043f40.dll
-
Size
420KB
-
MD5
42d8de138538e60fac3e081c16d49c80
-
SHA1
0a55f63e64db37577fb589ee4c0e8957c067005d
-
SHA256
c681f3500cfed68d680eb23eb935f8c0585cd2c79cd1cb57c690a74406043f40
-
SHA512
ddf79c801ef6043cf57ed83642266b1c62e94f90bfade09681debdc315e988836857e491fb64b212c7411d54987e5d741e73fc18568c207745d4710dd6eb5b87
-
SSDEEP
6144:xJTOJIq+rO9cdPysczfl0SRHwiorbjznDzKCgmNOXmjIwD5AgMygHHaPRz:xJTOG9nXchFRH0vD1gmN3kwqVHG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 444 4636 rundll32.exe 79 PID 4636 wrote to memory of 444 4636 rundll32.exe 79 PID 4636 wrote to memory of 444 4636 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c681f3500cfed68d680eb23eb935f8c0585cd2c79cd1cb57c690a74406043f40.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c681f3500cfed68d680eb23eb935f8c0585cd2c79cd1cb57c690a74406043f40.dll,#12⤵PID:444
-