Analysis
-
max time kernel
146s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
d7282949d090a8c89595c0bf5fb7336884879ca201b32154d559584f0b28214e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7282949d090a8c89595c0bf5fb7336884879ca201b32154d559584f0b28214e.dll
Resource
win10v2004-20220812-en
General
-
Target
d7282949d090a8c89595c0bf5fb7336884879ca201b32154d559584f0b28214e.dll
-
Size
77KB
-
MD5
320ad3080ce8adf5ff1f38f13e17ac78
-
SHA1
3fb8afad15d701892da884a6fae00f9f287ae0b6
-
SHA256
d7282949d090a8c89595c0bf5fb7336884879ca201b32154d559584f0b28214e
-
SHA512
f526eb03b03046d772a6872e837096f9f8d257ffeab2bdf9e724af823f0bfdb85bb76e57a71a6e00a20a68ffc33995a622ddb85f333135adbeff30b337667813
-
SSDEEP
1536:xr2gzptPtfsOkkT0KoeV3EWa8z7HQ25fog3uf6XJ:xrTzWK73EWa8z7bogefKJ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4460 wrote to memory of 3016 4460 rundll32.exe 79 PID 4460 wrote to memory of 3016 4460 rundll32.exe 79 PID 4460 wrote to memory of 3016 4460 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7282949d090a8c89595c0bf5fb7336884879ca201b32154d559584f0b28214e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7282949d090a8c89595c0bf5fb7336884879ca201b32154d559584f0b28214e.dll,#12⤵PID:3016
-