Analysis
-
max time kernel
143s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 13:58
Static task
static1
Behavioral task
behavioral1
Sample
c2796c70fab7da968cb2532d25b900d307ec823ac601d882b6fa724829f1cd4a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c2796c70fab7da968cb2532d25b900d307ec823ac601d882b6fa724829f1cd4a.dll
Resource
win10v2004-20221111-en
General
-
Target
c2796c70fab7da968cb2532d25b900d307ec823ac601d882b6fa724829f1cd4a.dll
-
Size
92KB
-
MD5
a7b33b45c376cd3a19de30e999268be7
-
SHA1
e491b2e0d757d01568f46f2d5c60dc8c29a24034
-
SHA256
c2796c70fab7da968cb2532d25b900d307ec823ac601d882b6fa724829f1cd4a
-
SHA512
9b941ee8aa7eef605d6e22cf72febdda22f157ad76da16be5cca5ca87e65cafa72d439c8eb8af3071dd88f008fe18293787552951bf7db5b7b2939544bbc9211
-
SSDEEP
1536:CJ37dCa+HjhAmNFHkiCkrlKg/8uiT5wHGIkIvzoz:CJ37JCdFHXlJ/jc+HHkR
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1876 1748 rundll32.exe 83 PID 1748 wrote to memory of 1876 1748 rundll32.exe 83 PID 1748 wrote to memory of 1876 1748 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2796c70fab7da968cb2532d25b900d307ec823ac601d882b6fa724829f1cd4a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2796c70fab7da968cb2532d25b900d307ec823ac601d882b6fa724829f1cd4a.dll,#12⤵PID:1876
-