Analysis
-
max time kernel
147s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
daef24496b1c5af337447e4a8d82fcd737e2c0a8116e46278dfc145707cd14b4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
daef24496b1c5af337447e4a8d82fcd737e2c0a8116e46278dfc145707cd14b4.dll
Resource
win10v2004-20221111-en
General
-
Target
daef24496b1c5af337447e4a8d82fcd737e2c0a8116e46278dfc145707cd14b4.dll
-
Size
184KB
-
MD5
18b3b5c009fb08a865ad7ed36f7cd4cd
-
SHA1
ba66826b5afa37299aee8adb243cd64b60dfe3db
-
SHA256
daef24496b1c5af337447e4a8d82fcd737e2c0a8116e46278dfc145707cd14b4
-
SHA512
32a5a4270ad416b2af3573eb1a32fd27680a2c0c5cf2aeafb5046d10dd4c4023cb6c0ac81463ad0317bcfe8940667a7cf5dfe7569d03d70fc962405ed3dfed08
-
SSDEEP
3072:Feay9fA4f3YO8Zzi6IxEqceggnTKVLbSMMXKsh5j5JORZ0M0d5hTBfOl17P71I6W:b+ICyhzgL/j5uaLhTBRUSGa
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4264 3632 rundll32.exe 84 PID 3632 wrote to memory of 4264 3632 rundll32.exe 84 PID 3632 wrote to memory of 4264 3632 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daef24496b1c5af337447e4a8d82fcd737e2c0a8116e46278dfc145707cd14b4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daef24496b1c5af337447e4a8d82fcd737e2c0a8116e46278dfc145707cd14b4.dll,#12⤵PID:4264
-