Analysis
-
max time kernel
112s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 07:28
Behavioral task
behavioral1
Sample
bc462682b11cde9afa14112f4c260679565cb476daa3c8639fa5c14ac3d49200.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc462682b11cde9afa14112f4c260679565cb476daa3c8639fa5c14ac3d49200.dll
Resource
win10v2004-20220901-en
General
-
Target
bc462682b11cde9afa14112f4c260679565cb476daa3c8639fa5c14ac3d49200.dll
-
Size
12KB
-
MD5
4e2802a31788dbfd5a03a4bcba4288bc
-
SHA1
27e84ba2f75ac8632f4a666f52ff5c308273c018
-
SHA256
bc462682b11cde9afa14112f4c260679565cb476daa3c8639fa5c14ac3d49200
-
SHA512
0b3f25d729ee1305d859476ce7d4db665ab8ff39dd9a34130cdc46294d8d6dfe8b84dfc0f4cbe82448db98d961d6ec77f3859c6bcf792cf43152281f0cead9c7
-
SSDEEP
192:FVl0FcwhI1KhVJHn5bCVQQmeW4WOIZcSVnd/VrTiIsVILcIKAiqeFRe8W52W4W:FEFcwhC+/kVQQmeibfVrrTRsSnKAi1rg
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2324-133-0x0000000010000000-0x000000001000B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2324 2224 rundll32.exe 68 PID 2224 wrote to memory of 2324 2224 rundll32.exe 68 PID 2224 wrote to memory of 2324 2224 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc462682b11cde9afa14112f4c260679565cb476daa3c8639fa5c14ac3d49200.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc462682b11cde9afa14112f4c260679565cb476daa3c8639fa5c14ac3d49200.dll,#12⤵PID:2324
-