Analysis
-
max time kernel
147s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
23-05-2022 21:17
Static task
static1
Behavioral task
behavioral1
Sample
58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8.dll
-
Size
5KB
-
MD5
628d6dca5e9ff8f515dec35a7e289e24
-
SHA1
3f46896c584f5cf73bfdeb310d625e20c5e4e888
-
SHA256
58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8
-
SHA512
14c1d63a3ca384def9837f9ca95720dec66759e13cd34112921ef5be5847540ad5913e25f83d533577833cc8c1c78e36ce04dc0ff2a4caa63382e69b10ee832a
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2520 set thread context of 3624 2520 rundll32.exe rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1260 wrote to memory of 2520 1260 rundll32.exe rundll32.exe PID 1260 wrote to memory of 2520 1260 rundll32.exe rundll32.exe PID 1260 wrote to memory of 2520 1260 rundll32.exe rundll32.exe PID 2520 wrote to memory of 3624 2520 rundll32.exe rundll32.exe PID 2520 wrote to memory of 3624 2520 rundll32.exe rundll32.exe PID 2520 wrote to memory of 3624 2520 rundll32.exe rundll32.exe PID 2520 wrote to memory of 3624 2520 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe3⤵PID:3624