Analysis
-
max time kernel
103s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
a24ec218208b41d3c9b7d15d41c7789117454ea30ec4e213dc686e77813a2b45.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a24ec218208b41d3c9b7d15d41c7789117454ea30ec4e213dc686e77813a2b45.dll
Resource
win10v2004-20221111-en
General
-
Target
a24ec218208b41d3c9b7d15d41c7789117454ea30ec4e213dc686e77813a2b45.dll
-
Size
640KB
-
MD5
7aa066477603f55c439028e4de2e6642
-
SHA1
f1eb56ac6094729776dd0c5efa80f01fccbd744d
-
SHA256
a24ec218208b41d3c9b7d15d41c7789117454ea30ec4e213dc686e77813a2b45
-
SHA512
d92c961577ad9ead86d4ce8b02a22a559a5346d5990edaad215046a6a1a4e4bbe3d4744e09c96488e194281e6e3d11bc9e7b236a49b31a3b3f3140a0320edb34
-
SSDEEP
12288:QljQRl3iZwl3JBrySD9CkkgC28DWl0RJK2LgAN4c1DJ92trs1tTK3+uZ:Q9WZiZCCMCkkBRDeSjcjc1DJ92ts1tWJ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4664 wrote to memory of 4456 4664 rundll32.exe 82 PID 4664 wrote to memory of 4456 4664 rundll32.exe 82 PID 4664 wrote to memory of 4456 4664 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a24ec218208b41d3c9b7d15d41c7789117454ea30ec4e213dc686e77813a2b45.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a24ec218208b41d3c9b7d15d41c7789117454ea30ec4e213dc686e77813a2b45.dll,#12⤵PID:4456
-