Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 09:28
Behavioral task
behavioral1
Sample
a890d71b0c5791ad70d14106ffb22a3c70c90e72f696d81e0d20ac94c8c26cf6.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a890d71b0c5791ad70d14106ffb22a3c70c90e72f696d81e0d20ac94c8c26cf6.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a890d71b0c5791ad70d14106ffb22a3c70c90e72f696d81e0d20ac94c8c26cf6.dll
-
Size
67KB
-
MD5
48b1be50c2173a1bf4c96cf703c65900
-
SHA1
06baef32f63c3103f6d9b44fcfbfd043655b3cdd
-
SHA256
a890d71b0c5791ad70d14106ffb22a3c70c90e72f696d81e0d20ac94c8c26cf6
-
SHA512
dc2bf7df19bfcb244462c41e358cd5f6727d9548718573fbb499f9c720f1b3f58dd670baffbb396f7dfed85a9665e5906a04a3619cf545d851e19b76b97d9f21
-
SSDEEP
1536:lW83YdZFpjuc7xux65cEaRWZxW0hTEqmGMndk7:lWCYr6cQx20Ok0hTEbGMdk
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1844 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1844 1500 rundll32.exe 27 PID 1500 wrote to memory of 1844 1500 rundll32.exe 27 PID 1500 wrote to memory of 1844 1500 rundll32.exe 27 PID 1500 wrote to memory of 1844 1500 rundll32.exe 27 PID 1500 wrote to memory of 1844 1500 rundll32.exe 27 PID 1500 wrote to memory of 1844 1500 rundll32.exe 27 PID 1500 wrote to memory of 1844 1500 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a890d71b0c5791ad70d14106ffb22a3c70c90e72f696d81e0d20ac94c8c26cf6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a890d71b0c5791ad70d14106ffb22a3c70c90e72f696d81e0d20ac94c8c26cf6.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-