Analysis
-
max time kernel
189s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 12:31
Static task
static1
Behavioral task
behavioral1
Sample
9132ae4af71d5e3436cbe62389d224210df70bcde274b9a1335a488e3551fc6c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9132ae4af71d5e3436cbe62389d224210df70bcde274b9a1335a488e3551fc6c.dll
Resource
win10v2004-20221111-en
General
-
Target
9132ae4af71d5e3436cbe62389d224210df70bcde274b9a1335a488e3551fc6c.dll
-
Size
395KB
-
MD5
02b1ac2a29f4d355df7a016d8b9c6076
-
SHA1
f5ee4ca636cddd54f771c204f55ca458781c0dda
-
SHA256
9132ae4af71d5e3436cbe62389d224210df70bcde274b9a1335a488e3551fc6c
-
SHA512
4d0bbe07ce6d8e4a3de3133c430d8e636794ad3c60df9bed9fb01da7b06dc50cf59de5edc4274e886c433f9d3f116e6a4fff8e7b4b02bad9b3a3376e3f0c699e
-
SSDEEP
6144:7ph/Q6YKARvny3e0Bl7DezK1357ULz/hRMvc61oe8VWKt3mN6tbShMGLd:7pjY1nZOlGzK1357+tq7Kt3mNgbShM
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2440 2300 rundll32.exe 82 PID 2300 wrote to memory of 2440 2300 rundll32.exe 82 PID 2300 wrote to memory of 2440 2300 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9132ae4af71d5e3436cbe62389d224210df70bcde274b9a1335a488e3551fc6c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9132ae4af71d5e3436cbe62389d224210df70bcde274b9a1335a488e3551fc6c.dll,#12⤵PID:2440
-