Analysis
-
max time kernel
131s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-01-2022 18:23
Static task
static1
Behavioral task
behavioral1
Sample
5e3907e9e2ed8ff12bb4e96b52401d871526c5ed502d2149dd4f680da4925590.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
5e3907e9e2ed8ff12bb4e96b52401d871526c5ed502d2149dd4f680da4925590.dll
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
5e3907e9e2ed8ff12bb4e96b52401d871526c5ed502d2149dd4f680da4925590.dll
-
Size
2.3MB
-
MD5
8edfa086de4dfdc93c0551bbb08cd5a8
-
SHA1
4b1b5bed35bc676e835de14ee033339d37f4549d
-
SHA256
5e3907e9e2ed8ff12bb4e96b52401d871526c5ed502d2149dd4f680da4925590
-
SHA512
c91371d98116c58c9f2728e53079708e423145da9e25384b9e5d69efa3a3c29614bde40eec66cb38c33a12c42bf9074af8d7f29fccc4974ad3d5e871aef89385
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3796 wrote to memory of 1948 3796 rundll32.exe 52 PID 3796 wrote to memory of 1948 3796 rundll32.exe 52 PID 3796 wrote to memory of 1948 3796 rundll32.exe 52
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e3907e9e2ed8ff12bb4e96b52401d871526c5ed502d2149dd4f680da4925590.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e3907e9e2ed8ff12bb4e96b52401d871526c5ed502d2149dd4f680da4925590.dll,#12⤵PID:1948
-