Analysis
-
max time kernel
187s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 11:45
Static task
static1
Behavioral task
behavioral1
Sample
320fddd681a5f66de7b110e9fca24a9967089c04a81390af9377c487800c55de.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
320fddd681a5f66de7b110e9fca24a9967089c04a81390af9377c487800c55de.dll
Resource
win10v2004-20221111-en
General
-
Target
320fddd681a5f66de7b110e9fca24a9967089c04a81390af9377c487800c55de.dll
-
Size
7KB
-
MD5
42fb6d5cb7c8f78112b8e110c62132a0
-
SHA1
eee59d700f8a69a2e4017bc0ee6bedf2c7ae3e3f
-
SHA256
320fddd681a5f66de7b110e9fca24a9967089c04a81390af9377c487800c55de
-
SHA512
a126b8d74e880d81e7cf31d34c047395cb34ab93a44a6f1855dfaff65479eef6cd2edfb7bb0284e874372e9533c96481551be0f721c6152dae1d6f12a5529cb9
-
SSDEEP
96:PMXB0rw0MI/pwbd73P4Ln9KVZQg9CI8rJEt1jWYkOeGIUHV:kXIwbdL4LQVZQgsEPka1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 364 wrote to memory of 3300 364 rundll32.exe 83 PID 364 wrote to memory of 3300 364 rundll32.exe 83 PID 364 wrote to memory of 3300 364 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\320fddd681a5f66de7b110e9fca24a9967089c04a81390af9377c487800c55de.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\320fddd681a5f66de7b110e9fca24a9967089c04a81390af9377c487800c55de.dll,#12⤵PID:3300
-