Analysis
-
max time kernel
247s -
max time network
276s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
a633b3ffe0524390c7021afbfef2fdbd0b10b16ca2510a255a45567c80afe5cc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a633b3ffe0524390c7021afbfef2fdbd0b10b16ca2510a255a45567c80afe5cc.dll
Resource
win10v2004-20221111-en
General
-
Target
a633b3ffe0524390c7021afbfef2fdbd0b10b16ca2510a255a45567c80afe5cc.dll
-
Size
110KB
-
MD5
b70ce697d1fd767a2e3543d670d22e40
-
SHA1
dac4585ca1a818c033e2d78230762f7021be548d
-
SHA256
a633b3ffe0524390c7021afbfef2fdbd0b10b16ca2510a255a45567c80afe5cc
-
SHA512
02a52f1e1a1a1c82009a817c389a01402b4b2b835f72a0a9afc575aa69cbb3cee42d4742b2dd9a979ab06929f1505e9f1e2ef37c76ba69155026f7c065835f4a
-
SSDEEP
1536:rPPXAQ3qa92fOcngux4dTEz4heacXrZzize+HIjX:7PXbP9VW3xkI0h4ize+HIjX
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5080 wrote to memory of 2492 5080 rundll32.exe 81 PID 5080 wrote to memory of 2492 5080 rundll32.exe 81 PID 5080 wrote to memory of 2492 5080 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a633b3ffe0524390c7021afbfef2fdbd0b10b16ca2510a255a45567c80afe5cc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a633b3ffe0524390c7021afbfef2fdbd0b10b16ca2510a255a45567c80afe5cc.dll,#12⤵PID:2492
-