Analysis
-
max time kernel
132s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
0957b1f8b07f75d3843aad11f48fa6e500ce5ceab59c4dcb3bf68821fc918c24.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0957b1f8b07f75d3843aad11f48fa6e500ce5ceab59c4dcb3bf68821fc918c24.dll
Resource
win10v2004-20220901-en
General
-
Target
0957b1f8b07f75d3843aad11f48fa6e500ce5ceab59c4dcb3bf68821fc918c24.dll
-
Size
6KB
-
MD5
985da30037f2aaea2342ce4e0289e7e0
-
SHA1
b49ca6288dd0ff9d6165735d5dfc939bec5c49c7
-
SHA256
0957b1f8b07f75d3843aad11f48fa6e500ce5ceab59c4dcb3bf68821fc918c24
-
SHA512
3d3059f7a4b7977f29ae63c7d54696da4737b7fca4b8fe57028cd394e016cecdc70d298bf09677d0c30f51458a1c5d2bd8e18f0cb4f25ebcdead6d1dcaf216cd
-
SSDEEP
96:nGTKrYJyJ5gT9jXk9eXWI/n9e1r/CVd7p0jsnmUD7AlG8P:nGTWJGp0UZUd6378snt7Alj
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4884 wrote to memory of 3224 4884 rundll32.exe 83 PID 4884 wrote to memory of 3224 4884 rundll32.exe 83 PID 4884 wrote to memory of 3224 4884 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0957b1f8b07f75d3843aad11f48fa6e500ce5ceab59c4dcb3bf68821fc918c24.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0957b1f8b07f75d3843aad11f48fa6e500ce5ceab59c4dcb3bf68821fc918c24.dll,#12⤵PID:3224
-