Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2022 23:30
Static task
static1
Behavioral task
behavioral1
Sample
1f05b8e3722a4058888b80e4af602ba084a0bf1fd3d75f7062d296c5ae364ed5.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1f05b8e3722a4058888b80e4af602ba084a0bf1fd3d75f7062d296c5ae364ed5.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
1f05b8e3722a4058888b80e4af602ba084a0bf1fd3d75f7062d296c5ae364ed5.dll
-
Size
31KB
-
MD5
4f5f13b92a5881ceedce218f85ae4db4
-
SHA1
2e993a826120355eca5418dcba9f1c686abfef0e
-
SHA256
1f05b8e3722a4058888b80e4af602ba084a0bf1fd3d75f7062d296c5ae364ed5
-
SHA512
a26bfdd379e95e33f624fb7ebc632456ac5f8511422a76bc10c3e3b6d987507d58244785cf8cfb772c8b7072c6708c0e18a06de14b505785eff24938af90db07
-
SSDEEP
768:q4JWA1CqWe0PamHQ267tM/AChqDERIE8vB:PkA1kPamM7tEhkYRIE8Z
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4540 wrote to memory of 4180 4540 rundll32.exe 81 PID 4540 wrote to memory of 4180 4540 rundll32.exe 81 PID 4540 wrote to memory of 4180 4540 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f05b8e3722a4058888b80e4af602ba084a0bf1fd3d75f7062d296c5ae364ed5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f05b8e3722a4058888b80e4af602ba084a0bf1fd3d75f7062d296c5ae364ed5.dll,#12⤵PID:4180
-