Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 11:51
Static task
static1
Behavioral task
behavioral1
Sample
c31dc963261ac4bd3bccbe36f6dd94d28b380aa9e97cb0a9dc87c2c90908870b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c31dc963261ac4bd3bccbe36f6dd94d28b380aa9e97cb0a9dc87c2c90908870b.dll
Resource
win10v2004-20220812-en
General
-
Target
c31dc963261ac4bd3bccbe36f6dd94d28b380aa9e97cb0a9dc87c2c90908870b.dll
-
Size
6KB
-
MD5
67fa3ea7828d7566ec9f75c2b3d8e230
-
SHA1
4062bd50322c43a1e3b9767fee104400dec600fc
-
SHA256
c31dc963261ac4bd3bccbe36f6dd94d28b380aa9e97cb0a9dc87c2c90908870b
-
SHA512
392378265ebedc1a6f311aa5ad6fee4fe5c4f5cb19dacbe056455a87848aa69fb8e298287ed6161396494b50b8a7fdeef86433d9bc234c16cce3f37ed091ab4f
-
SSDEEP
48:a5zjMTGcITBVQVE1lcJGv5dbnIvyG3A9y93sZJTvsZEvdpTbyA02n6XypV1FyyVT:iT3Qu847b2YP027bFp8nmc7ngO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1928 1932 rundll32.exe 80 PID 1932 wrote to memory of 1928 1932 rundll32.exe 80 PID 1932 wrote to memory of 1928 1932 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c31dc963261ac4bd3bccbe36f6dd94d28b380aa9e97cb0a9dc87c2c90908870b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c31dc963261ac4bd3bccbe36f6dd94d28b380aa9e97cb0a9dc87c2c90908870b.dll,#12⤵PID:1928
-