Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-12-2020 16:35
Behavioral task
behavioral1
Sample
0201b92d3d877df4de0d109ce6f3d647cfde3ab9d881f8cddc10d4bb8e5f21ad.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0201b92d3d877df4de0d109ce6f3d647cfde3ab9d881f8cddc10d4bb8e5f21ad.dll
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
0201b92d3d877df4de0d109ce6f3d647cfde3ab9d881f8cddc10d4bb8e5f21ad.dll
-
Size
549KB
-
MD5
b32892d699c39949e9b648d6b72fe5cf
-
SHA1
b67048acde6f73e76a5004331130824fa810670e
-
SHA256
0201b92d3d877df4de0d109ce6f3d647cfde3ab9d881f8cddc10d4bb8e5f21ad
-
SHA512
6c73cd30febac92a59785bac5b13d25b5485e9e0e16ec82e6053f5ec6e342f42dd0273dd8548630946594816bc9bb7af18e6a87f15afa07cb5106d6df9f966b6
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4688 wrote to memory of 4736 4688 rundll32.exe 69 PID 4688 wrote to memory of 4736 4688 rundll32.exe 69 PID 4688 wrote to memory of 4736 4688 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0201b92d3d877df4de0d109ce6f3d647cfde3ab9d881f8cddc10d4bb8e5f21ad.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0201b92d3d877df4de0d109ce6f3d647cfde3ab9d881f8cddc10d4bb8e5f21ad.dll,#12⤵PID:4736
-