Analysis
-
max time kernel
158s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
4e710d2280184095246cb727b7595c744728d50ec3cda5a922665af8e1eafc68.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4e710d2280184095246cb727b7595c744728d50ec3cda5a922665af8e1eafc68.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
4e710d2280184095246cb727b7595c744728d50ec3cda5a922665af8e1eafc68.dll
-
Size
3KB
-
MD5
061d9b750c121447e3c49323418c815b
-
SHA1
9b1885ce3a1180e299fa98611d3093abb4210eab
-
SHA256
4e710d2280184095246cb727b7595c744728d50ec3cda5a922665af8e1eafc68
-
SHA512
d0692796dc10cd53a0c8bb74ac8d251ab8c901b6ec33fdd68c660b1327f1c10e95b3b41759fd26cbd811b6d49d047b7c42cfab9a5bb7554833c4fa38254a21b4
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4388 wrote to memory of 4180 4388 rundll32.exe 83 PID 4388 wrote to memory of 4180 4388 rundll32.exe 83 PID 4388 wrote to memory of 4180 4388 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4e710d2280184095246cb727b7595c744728d50ec3cda5a922665af8e1eafc68.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4e710d2280184095246cb727b7595c744728d50ec3cda5a922665af8e1eafc68.dll,#12⤵PID:4180
-