Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
16-09-2021 14:37
Static task
static1
Behavioral task
behavioral1
Sample
www1.dll
Resource
win7-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
www1.dll
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
www1.dll
-
Size
316KB
-
MD5
5ec89ea30af2cc38ae183d12ffacbcf7
-
SHA1
bee82e104c1082442c7ff029b2781a04a3e80cd5
-
SHA256
85d0b72fe822fd6c22827b4da1917d2c1f2d9faa838e003e78e533384ea80939
-
SHA512
7e25703e68ec87d1da4b8d5f2bfe4e1e09b6bd88bb3e662b82cda77496badd5c6c1b3685ade9c4d4a100fb43972d3356bb22c7089a4edc2e1c174aa3fbf639cf
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 7 860 rundll32.exe 13 860 rundll32.exe 16 860 rundll32.exe 18 860 rundll32.exe 19 860 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 764 wrote to memory of 860 764 rundll32.exe 68 PID 764 wrote to memory of 860 764 rundll32.exe 68 PID 764 wrote to memory of 860 764 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\www1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\www1.dll,#12⤵
- Blocklisted process makes network request
PID:860
-