Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
3c725c238631163885c460ada8261d1ad5b64f7928dc2625179f57ecb1064360.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c725c238631163885c460ada8261d1ad5b64f7928dc2625179f57ecb1064360.dll
Resource
win10v2004-20221111-en
General
-
Target
3c725c238631163885c460ada8261d1ad5b64f7928dc2625179f57ecb1064360.dll
-
Size
150KB
-
MD5
70a3bebe16b3e41b8e54c2a766407025
-
SHA1
5feb283873b4ad05f510c4877fca977d64d7c2a9
-
SHA256
3c725c238631163885c460ada8261d1ad5b64f7928dc2625179f57ecb1064360
-
SHA512
ce4e48c6c4de69b395044e22c09a4f883d2fe86abeff40f6addc916dcca2920a36984f5055873138a97506c79b059852223a5fc0dbe9102d9791ec70048694ec
-
SSDEEP
1536:SRTQsIwIJkuvfZ/AuwhjTUemzoIcV+cYFD63nQtIDmUz2iu6MmpbQ3RPor+RTyfz:MDyxvfGhtx+bDQmIxiShfqsER
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1964 1664 rundll32.exe 82 PID 1664 wrote to memory of 1964 1664 rundll32.exe 82 PID 1664 wrote to memory of 1964 1664 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c725c238631163885c460ada8261d1ad5b64f7928dc2625179f57ecb1064360.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c725c238631163885c460ada8261d1ad5b64f7928dc2625179f57ecb1064360.dll,#12⤵PID:1964
-