Analysis
-
max time kernel
163s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
8b8dcf1fada0219268001143b115338433cdeaaf87464b05753105bfc2d35414.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8b8dcf1fada0219268001143b115338433cdeaaf87464b05753105bfc2d35414.dll
Resource
win10v2004-20221111-en
General
-
Target
8b8dcf1fada0219268001143b115338433cdeaaf87464b05753105bfc2d35414.dll
-
Size
364KB
-
MD5
0d0bea986c5ed990c487511fb598690e
-
SHA1
cb04fee9e605d43713a4cacda1f43e9a3f1e23a7
-
SHA256
8b8dcf1fada0219268001143b115338433cdeaaf87464b05753105bfc2d35414
-
SHA512
2b3e082e869eba1e0bfc6d4117949c6fe2a8d0c09d08298fe6a91e59538685947ea51a1b20b7186bf15c53e14846016d5d477a871eb10d1798f84bcf923908e3
-
SSDEEP
6144:ifNhV+DEPs88jnKeUDJgBAkLRc5v3jwXQDiLBAm89iPSUTIw5QCepX2ROYWxwib+:ifNhV+DEPs88jnKeUDJgBAkLRc5v3jw9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 712 wrote to memory of 1632 712 rundll32.exe 82 PID 712 wrote to memory of 1632 712 rundll32.exe 82 PID 712 wrote to memory of 1632 712 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b8dcf1fada0219268001143b115338433cdeaaf87464b05753105bfc2d35414.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b8dcf1fada0219268001143b115338433cdeaaf87464b05753105bfc2d35414.dll,#12⤵PID:1632
-