Analysis
-
max time kernel
163s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 21:52
Static task
static1
Behavioral task
behavioral1
Sample
a0d6cd33e7caf19e527fb0092f18ca56d2a7b1878332633906936a294d205429.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0d6cd33e7caf19e527fb0092f18ca56d2a7b1878332633906936a294d205429.dll
Resource
win10v2004-20220812-en
General
-
Target
a0d6cd33e7caf19e527fb0092f18ca56d2a7b1878332633906936a294d205429.dll
-
Size
156KB
-
MD5
427d3ec93b40bf02c39ef8d8a6b71139
-
SHA1
5c17bc598490efe92002aef0f0bba9fee29542b6
-
SHA256
a0d6cd33e7caf19e527fb0092f18ca56d2a7b1878332633906936a294d205429
-
SHA512
c4cbd30e98917e8850f621f29cb2e9450013a3ee658f6f0c8c4835abba419156bdd08a89cc8c74dd221b2731f416dc29096fa327e8b5f6eda6dde8445e58f7ed
-
SSDEEP
3072:jJbiAKUQ3qicpGoPbqNtcyHnJgg3HqTgX4gjM:jhRQ3qBDqNtZm0j4gY
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\Usp10.dll rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Usp10.dll rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1296 wrote to memory of 3108 1296 rundll32.exe 79 PID 1296 wrote to memory of 3108 1296 rundll32.exe 79 PID 1296 wrote to memory of 3108 1296 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0d6cd33e7caf19e527fb0092f18ca56d2a7b1878332633906936a294d205429.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0d6cd33e7caf19e527fb0092f18ca56d2a7b1878332633906936a294d205429.dll,#12⤵
- Drops file in Program Files directory
- Drops file in Windows directory
PID:3108
-