Analysis
-
max time kernel
155s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-06-2022 03:20
Static task
static1
Behavioral task
behavioral1
Sample
1a6a5c5111d72fdb3d1454311ebb8af8d852b6246a1ed0253fd81d131a6f6355.dll
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1a6a5c5111d72fdb3d1454311ebb8af8d852b6246a1ed0253fd81d131a6f6355.dll
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
1a6a5c5111d72fdb3d1454311ebb8af8d852b6246a1ed0253fd81d131a6f6355.dll
-
Size
14KB
-
MD5
0b44fadd1dab5fc637d48c1cd54f54c7
-
SHA1
5c1f3925a28a87495fbcf02469be89fec6e24331
-
SHA256
1a6a5c5111d72fdb3d1454311ebb8af8d852b6246a1ed0253fd81d131a6f6355
-
SHA512
2dcd1b76025c59020a62897ca21f6425ed189148cf5fd9462e2bcd1973a5722b0c40e63c6bea21f286cdeffae7ad4fc9605c96b1e76d5b9babe0b85213e3dec1
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3396 wrote to memory of 2628 3396 rundll32.exe 81 PID 3396 wrote to memory of 2628 3396 rundll32.exe 81 PID 3396 wrote to memory of 2628 3396 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a6a5c5111d72fdb3d1454311ebb8af8d852b6246a1ed0253fd81d131a6f6355.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a6a5c5111d72fdb3d1454311ebb8af8d852b6246a1ed0253fd81d131a6f6355.dll,#12⤵PID:2628
-