Analysis
-
max time kernel
216s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 13:13
Behavioral task
behavioral1
Sample
831a089f39e359032bf06f51021f257450054b3e45abf2a0bff271855388284b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
831a089f39e359032bf06f51021f257450054b3e45abf2a0bff271855388284b.dll
Resource
win10v2004-20221111-en
General
-
Target
831a089f39e359032bf06f51021f257450054b3e45abf2a0bff271855388284b.dll
-
Size
56KB
-
MD5
fb19701938363747f06d4570591700d0
-
SHA1
a2af7888d43f5fd0bb765bfb605b04cf95193b69
-
SHA256
831a089f39e359032bf06f51021f257450054b3e45abf2a0bff271855388284b
-
SHA512
cab9d1c562375d4075cea23767ceb4557c32d9303fe64d835798303da44e9b6e89b5e45afa327670a8e09e620fd76bb43a29fc0c78524465b18b88f095045dfa
-
SSDEEP
768:9xBtKtqyLUBVpL8I0CooJUToEL9efHLrWYdl8Fix4xu0/KOtdUmRhuB8nj+rCTe1:9nVpdIokoE5WrSpix4x7xphuBwOGQ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/436-133-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 436 4824 rundll32.exe 81 PID 4824 wrote to memory of 436 4824 rundll32.exe 81 PID 4824 wrote to memory of 436 4824 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\831a089f39e359032bf06f51021f257450054b3e45abf2a0bff271855388284b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\831a089f39e359032bf06f51021f257450054b3e45abf2a0bff271855388284b.dll,#12⤵PID:436
-