Analysis
-
max time kernel
5s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
15-05-2021 13:12
Static task
static1
Behavioral task
behavioral1
Sample
6d30ffae01dad0ae329b3c4c4260f799f9acd05137a5f6849d3601ab2290589b.dll
Resource
win7v20210410
0 signatures
0 seconds
General
-
Target
6d30ffae01dad0ae329b3c4c4260f799f9acd05137a5f6849d3601ab2290589b.dll
-
Size
128KB
-
MD5
17aab239917fe1f43f95297a177d574a
-
SHA1
6be52039f440a13681f50397b068c488af577dca
-
SHA256
6d30ffae01dad0ae329b3c4c4260f799f9acd05137a5f6849d3601ab2290589b
-
SHA512
b5b9766c2b059a14c10e33814521e1049436c92f9df8e9e15324a035dbdbbb39e9da1b465f7607dc3d142193eed375670b3f0bb08f49e8ce27a648d918ea509b
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 540 wrote to memory of 1936 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1936 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1936 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1936 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1936 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1936 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1936 540 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d30ffae01dad0ae329b3c4c4260f799f9acd05137a5f6849d3601ab2290589b.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d30ffae01dad0ae329b3c4c4260f799f9acd05137a5f6849d3601ab2290589b.dll,#12⤵