Analysis
-
max time kernel
178s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
53e911d37218651a838ff988a13ce46abdd5a4be239242555ea52b8d23fe183c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53e911d37218651a838ff988a13ce46abdd5a4be239242555ea52b8d23fe183c.dll
Resource
win10v2004-20220812-en
General
-
Target
53e911d37218651a838ff988a13ce46abdd5a4be239242555ea52b8d23fe183c.dll
-
Size
33KB
-
MD5
8c1632945d4b95ab88cd310ef85cbd20
-
SHA1
149ba317c2c1008e872f4355c08a820199dbf8e3
-
SHA256
53e911d37218651a838ff988a13ce46abdd5a4be239242555ea52b8d23fe183c
-
SHA512
8738a3c9d2f5916cf0283ddd326c4f011770efda7f85788adb4ed9c7139264691ca142a79cdabb9a8a483e74cd0dd83b5ff43808d5609b396b389b4bde4490f4
-
SSDEEP
768:J+OuA6LwO0o5xPa1kHNNv7or7tB7cOZivRtv/5:QOuA6LBxPxt17or7sTvRtvR
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4816 4424 rundll32.exe 80 PID 4424 wrote to memory of 4816 4424 rundll32.exe 80 PID 4424 wrote to memory of 4816 4424 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53e911d37218651a838ff988a13ce46abdd5a4be239242555ea52b8d23fe183c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53e911d37218651a838ff988a13ce46abdd5a4be239242555ea52b8d23fe183c.dll,#12⤵PID:4816
-