Analysis
-
max time kernel
35s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 21:15
Behavioral task
behavioral1
Sample
a4b205d9ebfe4b6b08f4ead27a79aea247215df4463f9e95c9cfe1db7b30b02a.dll
Resource
win7-20220718-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a4b205d9ebfe4b6b08f4ead27a79aea247215df4463f9e95c9cfe1db7b30b02a.dll
Resource
win10v2004-20220721-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a4b205d9ebfe4b6b08f4ead27a79aea247215df4463f9e95c9cfe1db7b30b02a.dll
-
Size
164KB
-
MD5
6640d80b412edfbdd836a5c3808a7748
-
SHA1
be1a4a447a371c01a8b3d95f66cabba8c1705e1d
-
SHA256
a4b205d9ebfe4b6b08f4ead27a79aea247215df4463f9e95c9cfe1db7b30b02a
-
SHA512
80a207734f2ad0d3858919da234c9b8943e7d06284cc18794495f8cb7d6131f50d6aac0602b90eb5d0aedab2f7346dca8ba82c9ee1c465fc0a24d4031294962a
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1952 wrote to memory of 2016 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 2016 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 2016 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 2016 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 2016 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 2016 1952 rundll32.exe rundll32.exe PID 1952 wrote to memory of 2016 1952 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4b205d9ebfe4b6b08f4ead27a79aea247215df4463f9e95c9cfe1db7b30b02a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4b205d9ebfe4b6b08f4ead27a79aea247215df4463f9e95c9cfe1db7b30b02a.dll,#12⤵PID:2016