Analysis
-
max time kernel
156s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
6c2f4ab23f1a05b1038790b891708279e6d0d102e58fcc540fb64eac4ccbb3fe.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
6c2f4ab23f1a05b1038790b891708279e6d0d102e58fcc540fb64eac4ccbb3fe.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
6c2f4ab23f1a05b1038790b891708279e6d0d102e58fcc540fb64eac4ccbb3fe.dll
-
Size
3KB
-
MD5
ee9e6f6a3ac9c5588d5236d03800dd29
-
SHA1
4186e5e96d481175a862c647426b5f1047173056
-
SHA256
6c2f4ab23f1a05b1038790b891708279e6d0d102e58fcc540fb64eac4ccbb3fe
-
SHA512
26b5a9de4835e0b27535eb1369c55e8f7b12c67a16500c6c9019a80dcf624fef308265404b1f3cc2d64307182b60b0162da8ae9ed9462ca240da521b78f4417e
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4364 4748 rundll32.exe 80 PID 4748 wrote to memory of 4364 4748 rundll32.exe 80 PID 4748 wrote to memory of 4364 4748 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6c2f4ab23f1a05b1038790b891708279e6d0d102e58fcc540fb64eac4ccbb3fe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6c2f4ab23f1a05b1038790b891708279e6d0d102e58fcc540fb64eac4ccbb3fe.dll,#12⤵PID:4364
-