Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-12-2021 09:09
Behavioral task
behavioral1
Sample
tmp/4c8732903478c79718a84b199bdff8a5da424484bceb221036ef83a7d95a4c33.exe.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
tmp/4c8732903478c79718a84b199bdff8a5da424484bceb221036ef83a7d95a4c33.exe.dll
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
tmp/4c8732903478c79718a84b199bdff8a5da424484bceb221036ef83a7d95a4c33.exe.dll
-
Size
117KB
-
MD5
c9860cf7afeee5663f19a5e7213cc924
-
SHA1
fe642ba648853ee9eb5548ccdcfe05ba4791f87e
-
SHA256
4c8732903478c79718a84b199bdff8a5da424484bceb221036ef83a7d95a4c33
-
SHA512
06e0f436ac7b8b2d9f236a3b042af8f8c332658a2914c3d9e9f1b743992ad92cc854d41dd1a371430b58e46d8b80fced169a28ada73402191e9a561d87f7df47
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1692 wrote to memory of 1684 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 1684 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 1684 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 1684 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 1684 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 1684 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 1684 1692 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tmp\4c8732903478c79718a84b199bdff8a5da424484bceb221036ef83a7d95a4c33.exe.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tmp\4c8732903478c79718a84b199bdff8a5da424484bceb221036ef83a7d95a4c33.exe.dll,#12⤵