Analysis
-
max time kernel
92s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 05:09
Static task
static1
Behavioral task
behavioral1
Sample
fa38731f10eaba307caa207990a8f85494c7bc3dbea27d804342ca567964018b.dll
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
fa38731f10eaba307caa207990a8f85494c7bc3dbea27d804342ca567964018b.dll
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
fa38731f10eaba307caa207990a8f85494c7bc3dbea27d804342ca567964018b.dll
-
Size
153KB
-
MD5
bc6f26692a740920714e5ecd07858154
-
SHA1
53a64fd1e7b98666eb32983d48e3bb7efee189e7
-
SHA256
fa38731f10eaba307caa207990a8f85494c7bc3dbea27d804342ca567964018b
-
SHA512
60e798e00a3a30032967caa89254218d9a25d495596bbd5a6f4ef6165a8ebc81f1c76499e90591626c922e739df11d348a20db1ac79ec1e6bd75d194b59e84bf
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3988 wrote to memory of 4300 3988 rundll32.exe 82 PID 3988 wrote to memory of 4300 3988 rundll32.exe 82 PID 3988 wrote to memory of 4300 3988 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa38731f10eaba307caa207990a8f85494c7bc3dbea27d804342ca567964018b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa38731f10eaba307caa207990a8f85494c7bc3dbea27d804342ca567964018b.dll,#12⤵PID:4300
-