Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-07-2022 07:24
Static task
static1
Behavioral task
behavioral1
Sample
1600-57-0x0000000000920000-0x0000000000942000-memory.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1600-57-0x0000000000920000-0x0000000000942000-memory.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
1600-57-0x0000000000920000-0x0000000000942000-memory.dll
-
Size
136KB
-
MD5
5ca15c93fea761432743a8dbba7b7109
-
SHA1
dc7f6daf2d078708b2a7dfec9d95a3fddb3c4198
-
SHA256
5ac3756d50b54b6d386a489262f8bc5f3da0e09bc23c37918eb0d875039e1982
-
SHA512
bf18660180156d3115b1ebbdeeeb53601414231951673b2903a21308e7da66ea5da1bc2f1f59f457ac312b8600ca9d869ec65800dd8cca31cf9312dfdd11a663
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2052 wrote to memory of 3176 2052 rundll32.exe rundll32.exe PID 2052 wrote to memory of 3176 2052 rundll32.exe rundll32.exe PID 2052 wrote to memory of 3176 2052 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1600-57-0x0000000000920000-0x0000000000942000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1600-57-0x0000000000920000-0x0000000000942000-memory.dll,#12⤵PID:3176
-