Analysis
-
max time kernel
69s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 09:15
Static task
static1
Behavioral task
behavioral1
Sample
932d1c208ffa57d83a185af3b29a17fc90b58ab9c51b8b6fe0ad9c45e86ee95f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
932d1c208ffa57d83a185af3b29a17fc90b58ab9c51b8b6fe0ad9c45e86ee95f.dll
Resource
win10v2004-20220901-en
General
-
Target
932d1c208ffa57d83a185af3b29a17fc90b58ab9c51b8b6fe0ad9c45e86ee95f.dll
-
Size
108KB
-
MD5
68e1522c642f773ad8953e1647d44742
-
SHA1
c2b2070b1954ea6225eade51101f66ab32217d70
-
SHA256
932d1c208ffa57d83a185af3b29a17fc90b58ab9c51b8b6fe0ad9c45e86ee95f
-
SHA512
595b1466b93cb2b4190d804da59261a382bf75c278f012fde94539a7ed244ad1ed60d287971b50f3f66b2cfa849f6be647fa47ae2f050654d06505a075710534
-
SSDEEP
1536:oN7FSZrYd35IARnmMrWAMeEqxyoBQEn+gRPZ7whBLulRPRh9QadhRF7KXdd/sJ+M:8wSdJX9mOcTjMOhBLo/Qa3jKPu+eIG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1368 wrote to memory of 3036 1368 rundll32.exe 84 PID 1368 wrote to memory of 3036 1368 rundll32.exe 84 PID 1368 wrote to memory of 3036 1368 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\932d1c208ffa57d83a185af3b29a17fc90b58ab9c51b8b6fe0ad9c45e86ee95f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\932d1c208ffa57d83a185af3b29a17fc90b58ab9c51b8b6fe0ad9c45e86ee95f.dll,#12⤵PID:3036
-