Analysis
-
max time kernel
181s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
8c6fee9cddbb1b2231832796a206f2960d6259fd2e2aa9adc2569bad0ecde067.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c6fee9cddbb1b2231832796a206f2960d6259fd2e2aa9adc2569bad0ecde067.dll
Resource
win10v2004-20220812-en
General
-
Target
8c6fee9cddbb1b2231832796a206f2960d6259fd2e2aa9adc2569bad0ecde067.dll
-
Size
96KB
-
MD5
67e1f4480a1154c054f3ec8c8f250820
-
SHA1
24af03a1a46aac8d1f9b00008f4e2c7702d2cdb1
-
SHA256
8c6fee9cddbb1b2231832796a206f2960d6259fd2e2aa9adc2569bad0ecde067
-
SHA512
8d405c206ff3eec7f9ee7e1b8d1620b1295537dbc7e86f717fa736ef9c0ca47e06617469c7668be887f0d70e38c4486305e17b42030242298e7d1304be28316e
-
SSDEEP
1536:jB7EgYTbYQrlQd9qBIxrztLikOloMG4dUVZIHZyOcsTXBvGCY6:ttKrlQd4BI5hLiZlof4SZ6Y+R
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/852-133-0x0000000002A20000-0x0000000002A2E000-memory.dmp upx behavioral2/memory/852-137-0x0000000002A20000-0x0000000002A2E000-memory.dmp upx behavioral2/memory/852-136-0x0000000002A20000-0x0000000002A2E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4868 wrote to memory of 852 4868 rundll32.exe 81 PID 4868 wrote to memory of 852 4868 rundll32.exe 81 PID 4868 wrote to memory of 852 4868 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c6fee9cddbb1b2231832796a206f2960d6259fd2e2aa9adc2569bad0ecde067.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c6fee9cddbb1b2231832796a206f2960d6259fd2e2aa9adc2569bad0ecde067.dll,#12⤵PID:852
-