Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 14:51
Static task
static1
Behavioral task
behavioral1
Sample
454182db8d933f8c7b92c73a7c3e9a641bc99083bb6725a4803028e590075bfc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
454182db8d933f8c7b92c73a7c3e9a641bc99083bb6725a4803028e590075bfc.dll
Resource
win10v2004-20220901-en
General
-
Target
454182db8d933f8c7b92c73a7c3e9a641bc99083bb6725a4803028e590075bfc.dll
-
Size
149KB
-
MD5
472d8534788b3f09e7019d17acb17dc3
-
SHA1
bd4da90a83bf709bee6a1ec80074a80ef4be0a49
-
SHA256
454182db8d933f8c7b92c73a7c3e9a641bc99083bb6725a4803028e590075bfc
-
SHA512
6844d3ab764d98ed77556f6d1a574ff94d9242492832366e41d925522b83abd20a519b943d0f71886163f2bbe4f729fb0177573186064ebb8e9f6a7922892c5d
-
SSDEEP
1536:hFhcI9IJkuvfZ/AuwQDEDZMJ3uxJtcw7eHWUFcYfTrW4rZq1SI6npoAXy/RQ8FWe:i6yxvfGQDo2pGe/lfWomh63f6HpL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1724 wrote to memory of 864 1724 rundll32.exe 82 PID 1724 wrote to memory of 864 1724 rundll32.exe 82 PID 1724 wrote to memory of 864 1724 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\454182db8d933f8c7b92c73a7c3e9a641bc99083bb6725a4803028e590075bfc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\454182db8d933f8c7b92c73a7c3e9a641bc99083bb6725a4803028e590075bfc.dll,#12⤵PID:864
-