Analysis
-
max time kernel
152s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 09:19
Behavioral task
behavioral1
Sample
ac32197b961eaf3715031c4e3288148ac02322d1417156baac1e44e873fdccd6.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ac32197b961eaf3715031c4e3288148ac02322d1417156baac1e44e873fdccd6.dll
Resource
win10v2004-20221111-en
General
-
Target
ac32197b961eaf3715031c4e3288148ac02322d1417156baac1e44e873fdccd6.dll
-
Size
125KB
-
MD5
61c76b2e1defc61eb653fb7b3b86a23e
-
SHA1
76e40333c0e7d814cb6b81eb4602939596cd43f8
-
SHA256
ac32197b961eaf3715031c4e3288148ac02322d1417156baac1e44e873fdccd6
-
SHA512
5b7993265549d9b0c8cbb47d9b37c154e0db0a837b664aaf27c137486529c18c617ce8f46f377af0233733be871a3b4cd00e1f78f87a63c26e719e94c6decd3f
-
SSDEEP
1536:tUiBy645eTwhA4ViQiJHGtSw2yZScPNOfYgUV5Rnk6p4UCmGxdSdJ09dFH:tUwQnjmHDFyZSMNIYgUtL4UCxuJ09dl
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4972 wrote to memory of 900 4972 rundll32.exe 81 PID 4972 wrote to memory of 900 4972 rundll32.exe 81 PID 4972 wrote to memory of 900 4972 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac32197b961eaf3715031c4e3288148ac02322d1417156baac1e44e873fdccd6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac32197b961eaf3715031c4e3288148ac02322d1417156baac1e44e873fdccd6.dll,#12⤵PID:900
-