Analysis
-
max time kernel
371s -
max time network
454s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe
Resource
win10v2004-20221111-en
2 signatures
150 seconds
General
-
Target
512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe
-
Size
854KB
-
MD5
251991e45cfee086aba5e5ae22d31a54
-
SHA1
bc2cc8b92968e969e80338366874672fd374f030
-
SHA256
512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e
-
SHA512
a94055c58586c96b9c66cb3d7cf2e4590e7d06b0e58662fcec64d0dbf0e3a2275c17ca6799400fd67c1ac50e617eefa7418b5026a5321128b6e949426b75ccdc
-
SSDEEP
24576:jaWiuID1Y2e6EE1iZF+3a9pj6AjDszA4bU:jaB91Y2ehE1i/ga/5UzF
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 57 4956 rundll32.exe 66 4956 rundll32.exe 67 4956 rundll32.exe 68 4956 rundll32.exe 69 4956 rundll32.exe 70 4956 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3020 wrote to memory of 4956 3020 512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe 79 PID 3020 wrote to memory of 4956 3020 512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe 79 PID 3020 wrote to memory of 4956 3020 512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe 79 PID 3020 wrote to memory of 4956 3020 512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe 79 PID 3020 wrote to memory of 4956 3020 512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe 79 PID 3020 wrote to memory of 4956 3020 512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe 79 PID 3020 wrote to memory of 4956 3020 512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe 79 PID 3020 wrote to memory of 4956 3020 512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe 79 PID 3020 wrote to memory of 4956 3020 512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe 79 PID 3020 wrote to memory of 4956 3020 512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe 79 PID 3020 wrote to memory of 4956 3020 512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe"C:\Users\Admin\AppData\Local\Temp\512b2609fa7d398c32465fe0e4092c0f1f337ba4471252c16f645df77212c43e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:4956
-