Analysis
-
max time kernel
175s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
a25fff80a85d109d4d45e19be1713948589c9b8bd2b22337653e0d4abbf53e2c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a25fff80a85d109d4d45e19be1713948589c9b8bd2b22337653e0d4abbf53e2c.dll
Resource
win10v2004-20221111-en
General
-
Target
a25fff80a85d109d4d45e19be1713948589c9b8bd2b22337653e0d4abbf53e2c.dll
-
Size
436KB
-
MD5
53379b9207c8ccce13a448fe5d2b19a2
-
SHA1
f123b999f8a0eefff54710f91339b9a0b6735775
-
SHA256
a25fff80a85d109d4d45e19be1713948589c9b8bd2b22337653e0d4abbf53e2c
-
SHA512
25ab13d38d69a5774fae8be9fe0a2a14d28766911f82d5ffec9e88e161571ebeb5e30e01606b8441fb3f16ae5d7804a602241356bf75a6903b0c9b278f59a1c4
-
SSDEEP
6144:hLJP133y8fufLAnptbzWAQsTrKIdpGRHj5n8FgRZ1+4v:JJP133L2LAptb9jqIdkV5n8CZ1+4v
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1748 1664 rundll32.exe 82 PID 1664 wrote to memory of 1748 1664 rundll32.exe 82 PID 1664 wrote to memory of 1748 1664 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a25fff80a85d109d4d45e19be1713948589c9b8bd2b22337653e0d4abbf53e2c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a25fff80a85d109d4d45e19be1713948589c9b8bd2b22337653e0d4abbf53e2c.dll,#12⤵PID:1748
-