Analysis
-
max time kernel
184s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
971555e89909274bb6dc3110fb19344a7789f9bf14190e00d1d2719c143950e5.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
971555e89909274bb6dc3110fb19344a7789f9bf14190e00d1d2719c143950e5.dll
Resource
win10v2004-20221111-en
General
-
Target
971555e89909274bb6dc3110fb19344a7789f9bf14190e00d1d2719c143950e5.dll
-
Size
77KB
-
MD5
a578f9f2662da61f010468b54c941fba
-
SHA1
0d7ff8a0f9f57c37bc1cb4890f20f5b6fe4514e1
-
SHA256
971555e89909274bb6dc3110fb19344a7789f9bf14190e00d1d2719c143950e5
-
SHA512
96be47a031ff86b61e4927f145cdd9d6da39bc68a0f184748dcdcec5b8ff2d45867978993ac9402aba1582d5b564bf6755c6c882907bab72d5f9bf388b25d2e7
-
SSDEEP
1536:oIKgJ+NcZvwQjAJybMKZ4R1/5qEqxKMqbvdYoqggL6ha:LJmivweAJynap50xKMwdZDh
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4872 wrote to memory of 4012 4872 rundll32.exe 83 PID 4872 wrote to memory of 4012 4872 rundll32.exe 83 PID 4872 wrote to memory of 4012 4872 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\971555e89909274bb6dc3110fb19344a7789f9bf14190e00d1d2719c143950e5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\971555e89909274bb6dc3110fb19344a7789f9bf14190e00d1d2719c143950e5.dll,#12⤵PID:4012
-