Analysis
-
max time kernel
40s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
01-02-2022 09:14
Static task
static1
Behavioral task
behavioral1
Sample
ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db.dll
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db.dll
-
Size
281KB
-
MD5
f3362eae787c09d8061194591dee0727
-
SHA1
cc5fe51c5b35dcef50b5adfc730b1354ae124bab
-
SHA256
ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db
-
SHA512
e0ba969db9b0c217c25246695186b53734a4e502765f73d018f91480cc2120fe2472c3a9931bbee998660afd558c54a79b81a80ab32ae59115107084ab7d0de0
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4452 wrote to memory of 4816 4452 rundll32.exe rundll32.exe PID 4452 wrote to memory of 4816 4452 rundll32.exe rundll32.exe PID 4452 wrote to memory of 4816 4452 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db.dll,#12⤵PID:4816