Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 13:14
Static task
static1
Behavioral task
behavioral1
Sample
1772-131-0x0000000010000000-0x0000000010079000-memory.dll
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1772-131-0x0000000010000000-0x0000000010079000-memory.dll
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
1772-131-0x0000000010000000-0x0000000010079000-memory.dll
-
Size
484KB
-
MD5
d907865776d51f089980c6f92732bdc3
-
SHA1
95cd2b1301586a08d5256f1ac8095bed5f2212e2
-
SHA256
7716a0268aac3c683d2a4bdfa29aa41d6257b7196988ef97d7675a0b8bfa190a
-
SHA512
1c1c1a181c8753f8afedffdece78cecee81f144127a939145fa11eb34197d4d0cb47fa9f1ce465354c9cc696feb197eaab2c1144b9cf3f64a511761aebe22ddb
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1560 wrote to memory of 1676 1560 rundll32.exe 28 PID 1560 wrote to memory of 1676 1560 rundll32.exe 28 PID 1560 wrote to memory of 1676 1560 rundll32.exe 28 PID 1560 wrote to memory of 1676 1560 rundll32.exe 28 PID 1560 wrote to memory of 1676 1560 rundll32.exe 28 PID 1560 wrote to memory of 1676 1560 rundll32.exe 28 PID 1560 wrote to memory of 1676 1560 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1772-131-0x0000000010000000-0x0000000010079000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1772-131-0x0000000010000000-0x0000000010079000-memory.dll,#12⤵PID:1676
-