Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 00:54
Static task
static1
Behavioral task
behavioral1
Sample
daa70a3c21659eae084f570aaa66fe194d4cbce337815b460c40ab744583c762.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
daa70a3c21659eae084f570aaa66fe194d4cbce337815b460c40ab744583c762.dll
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
daa70a3c21659eae084f570aaa66fe194d4cbce337815b460c40ab744583c762.dll
-
Size
116KB
-
MD5
86a99126b534c51795a43eaccb7f4534
-
SHA1
c53312e01ed58f665838a16a74fdcfb966e7a793
-
SHA256
daa70a3c21659eae084f570aaa66fe194d4cbce337815b460c40ab744583c762
-
SHA512
06d4e5bb96ea6d23bb595128663104bc2deaeea390330a29466741c9a92767f8d78c4467f25cb6e74cceef737da8e53a859e9a713552c905aabd7ff7584e0b83
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2400 wrote to memory of 2232 2400 rundll32.exe rundll32.exe PID 2400 wrote to memory of 2232 2400 rundll32.exe rundll32.exe PID 2400 wrote to memory of 2232 2400 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daa70a3c21659eae084f570aaa66fe194d4cbce337815b460c40ab744583c762.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daa70a3c21659eae084f570aaa66fe194d4cbce337815b460c40ab744583c762.dll,#12⤵PID:2232