Analysis
-
max time kernel
118s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 15:51
Behavioral task
behavioral1
Sample
07fb989a05a8bfe516636c251937281aeba636764e760148205624eccf973a56.dll
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
07fb989a05a8bfe516636c251937281aeba636764e760148205624eccf973a56.dll
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
07fb989a05a8bfe516636c251937281aeba636764e760148205624eccf973a56.dll
-
Size
3KB
-
MD5
6ff0a88eff0ec0fd16530267e63774ac
-
SHA1
930c4ba400743640ad00c91a057244a059ff0612
-
SHA256
07fb989a05a8bfe516636c251937281aeba636764e760148205624eccf973a56
-
SHA512
94b7074c26bac1d63f41f780c7d7dddef7b11fcc095a021f20c960efa7e54bf5ac66b068f3972dba2e5f68abd5626a9263db1113d43750721d9fa6c4ced63d83
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4388 wrote to memory of 3168 4388 rundll32.exe 41 PID 4388 wrote to memory of 3168 4388 rundll32.exe 41 PID 4388 wrote to memory of 3168 4388 rundll32.exe 41
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07fb989a05a8bfe516636c251937281aeba636764e760148205624eccf973a56.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07fb989a05a8bfe516636c251937281aeba636764e760148205624eccf973a56.dll,#12⤵PID:3168
-