Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 18:17
Static task
static1
Behavioral task
behavioral1
Sample
2f937175c965ca32a37c62e2e4423546063668191a219f53d5412597e197bf74.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2f937175c965ca32a37c62e2e4423546063668191a219f53d5412597e197bf74.dll
Resource
win10v2004-20220812-en
General
-
Target
2f937175c965ca32a37c62e2e4423546063668191a219f53d5412597e197bf74.dll
-
Size
96KB
-
MD5
412c6e5dcf84a95dce88db89f2e20970
-
SHA1
18655e66d8d7195eacc5fa4225496546d5b32531
-
SHA256
2f937175c965ca32a37c62e2e4423546063668191a219f53d5412597e197bf74
-
SHA512
c998ddbe6d8451161dee0e8a41f9f88e7e8b457f9172129d4f6c7001d037fc288fb7a05542f3950679d74b0de70a8f17519e3f6c0b1956149b366fd0732cd834
-
SSDEEP
768:5+R0Skc5Pk29YzWru+wKHkEFjIafWjMBeTcmCTvifJKzhuOQsZcXlfXO705jjA3p:85sorwWjNI1CTviBKaHV5sI8oKaoq
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4736 wrote to memory of 1512 4736 rundll32.exe 79 PID 4736 wrote to memory of 1512 4736 rundll32.exe 79 PID 4736 wrote to memory of 1512 4736 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f937175c965ca32a37c62e2e4423546063668191a219f53d5412597e197bf74.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f937175c965ca32a37c62e2e4423546063668191a219f53d5412597e197bf74.dll,#12⤵PID:1512
-