Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
480676397f3f9cae85df180113fe4566366463219f5fb8db17aae14ce9487669.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
480676397f3f9cae85df180113fe4566366463219f5fb8db17aae14ce9487669.dll
Resource
win10v2004-20220812-en
General
-
Target
480676397f3f9cae85df180113fe4566366463219f5fb8db17aae14ce9487669.dll
-
Size
180KB
-
MD5
95f52d755d634d4641049e5f848fff55
-
SHA1
2b1ff7a5bef94bd9de353e86f36e67310897a3f1
-
SHA256
480676397f3f9cae85df180113fe4566366463219f5fb8db17aae14ce9487669
-
SHA512
054bf3f24b12dddc20d6f102656203bb7a6fc4492f9229ed7c54d26d4c6208b8c3bed36a7e400beb4299edb82b95a9e5d71e5a1565b1732202663c8bedf36b24
-
SSDEEP
3072:YRBhQ/g0ez6FAvVJYl+dPrL+dm5ZKl/CbN2hZ6pPWeU3Tv5Yb8:Y1V5z6iripl6bNgIEX
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1764 1604 rundll32.exe 79 PID 1604 wrote to memory of 1764 1604 rundll32.exe 79 PID 1604 wrote to memory of 1764 1604 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\480676397f3f9cae85df180113fe4566366463219f5fb8db17aae14ce9487669.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\480676397f3f9cae85df180113fe4566366463219f5fb8db17aae14ce9487669.dll,#12⤵PID:1764
-