Analysis
-
max time kernel
182s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 11:24
Static task
static1
Behavioral task
behavioral1
Sample
29ca147236584d6f0ce488d5e10f8df4c3cbc65b190fc4ee566ae78c459d967d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
29ca147236584d6f0ce488d5e10f8df4c3cbc65b190fc4ee566ae78c459d967d.dll
Resource
win10v2004-20221111-en
General
-
Target
29ca147236584d6f0ce488d5e10f8df4c3cbc65b190fc4ee566ae78c459d967d.dll
-
Size
6KB
-
MD5
5140f51644aaf313f39a305c57beecf0
-
SHA1
0448ca66a797299aa5a3eb3ceeffa8232d886d33
-
SHA256
29ca147236584d6f0ce488d5e10f8df4c3cbc65b190fc4ee566ae78c459d967d
-
SHA512
79593ead93f0896de711fd0bc8e4a56f884560c5806bf13af36e526da9f4491f539e38de4ba3b932b4312a57763617e9ecc3e22adf870299818c4339f6170bf2
-
SSDEEP
96:nGTKrYJyJ5gT9jXk9eXWI/n9e1r/CVd7p0jsnmUD7OIC08:nGTWJGp0UZUd6378snt7OI98
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4268 wrote to memory of 4264 4268 rundll32.exe 83 PID 4268 wrote to memory of 4264 4268 rundll32.exe 83 PID 4268 wrote to memory of 4264 4268 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\29ca147236584d6f0ce488d5e10f8df4c3cbc65b190fc4ee566ae78c459d967d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\29ca147236584d6f0ce488d5e10f8df4c3cbc65b190fc4ee566ae78c459d967d.dll,#12⤵PID:4264
-