Analysis
-
max time kernel
148s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
45280cc136af790f8ec67f65c37600323e371e960aa5fa5efb8fcbed14fe5784.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
45280cc136af790f8ec67f65c37600323e371e960aa5fa5efb8fcbed14fe5784.dll
Resource
win10v2004-20221111-en
General
-
Target
45280cc136af790f8ec67f65c37600323e371e960aa5fa5efb8fcbed14fe5784.dll
-
Size
55KB
-
MD5
0ee03918b73380d23b8f2dc44cc8e7e0
-
SHA1
db7a4761e80a91377873af31b6e273f40c101932
-
SHA256
45280cc136af790f8ec67f65c37600323e371e960aa5fa5efb8fcbed14fe5784
-
SHA512
5c31c6d7e5e0fb5e50af1fb64ca3662d301be431eb0c7e33c9d877e12487839aefd1e1db1905133e5593ce446e353d987b111c9ea21526d5325de90e48229724
-
SSDEEP
768:M5SOT1bJLb+lxoTifw/CrAfbkhjiZtdFSoXApVfgYKjsEP9gBQHmmaogurpRm:MSOTJhKlx7fw/lfwsugYKjr9m
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2216 wrote to memory of 4720 2216 rundll32.exe 82 PID 2216 wrote to memory of 4720 2216 rundll32.exe 82 PID 2216 wrote to memory of 4720 2216 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45280cc136af790f8ec67f65c37600323e371e960aa5fa5efb8fcbed14fe5784.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45280cc136af790f8ec67f65c37600323e371e960aa5fa5efb8fcbed14fe5784.dll,#12⤵PID:4720
-