Analysis
-
max time kernel
153s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
ca8096378833925d900d597c47bf8fce5445587831f4e7e2f7610000ec4b2215.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca8096378833925d900d597c47bf8fce5445587831f4e7e2f7610000ec4b2215.dll
Resource
win10v2004-20221111-en
General
-
Target
ca8096378833925d900d597c47bf8fce5445587831f4e7e2f7610000ec4b2215.dll
-
Size
96KB
-
MD5
f2b55a7f291a132ec61c0647294b4279
-
SHA1
9655022d4b727afc53f08e6c146e8d85213e6004
-
SHA256
ca8096378833925d900d597c47bf8fce5445587831f4e7e2f7610000ec4b2215
-
SHA512
4ea9bf425f506ec7ba585ce7335fd8cba5626f7e4bd1c45144b766173b19ffd178db966f639d7083228d6fc36b2f31f7e4daebd9e334d06253bcadd2516b5e82
-
SSDEEP
1536:hJvrpTppT0QYgATmN2J652j+gCEZyb/8jHFv9FlF9BFfYRKYqgnqR:njp/PE6N2JBZyL8jHL/F9BRqKY5na
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1128 wrote to memory of 4536 1128 rundll32.exe 81 PID 1128 wrote to memory of 4536 1128 rundll32.exe 81 PID 1128 wrote to memory of 4536 1128 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca8096378833925d900d597c47bf8fce5445587831f4e7e2f7610000ec4b2215.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca8096378833925d900d597c47bf8fce5445587831f4e7e2f7610000ec4b2215.dll,#12⤵PID:4536
-