Analysis
-
max time kernel
35s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 22:13
Behavioral task
behavioral1
Sample
4d3aca2926c78c6d85c7b757ac606692145a1b9d78774ddc72d423d1c1897766.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4d3aca2926c78c6d85c7b757ac606692145a1b9d78774ddc72d423d1c1897766.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
4d3aca2926c78c6d85c7b757ac606692145a1b9d78774ddc72d423d1c1897766.dll
-
Size
468KB
-
MD5
24d81c4f342a69962708b2150d906e46
-
SHA1
aa8c22ad8e11340e6862c9d7560d98a22e188320
-
SHA256
4d3aca2926c78c6d85c7b757ac606692145a1b9d78774ddc72d423d1c1897766
-
SHA512
b8a0164d43c75adb63744ffbced760ea4cb4c293af4b50430c6efe8e6c0c6febd43ec1c4c3d614170972989510b54ed6ab50b7225375d575602b09f455128928
-
SSDEEP
6144:Y0rUeRR6i0tRXwF8PKWc2lzvpUNsYE6VPiGZAxJUBu+7rHxYp9kvvK8/Ld/NtN:jrT6dPZ5c2doPrOJhWL2yS4Ht
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27 PID 748 wrote to memory of 1116 748 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d3aca2926c78c6d85c7b757ac606692145a1b9d78774ddc72d423d1c1897766.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d3aca2926c78c6d85c7b757ac606692145a1b9d78774ddc72d423d1c1897766.dll,#12⤵PID:1116
-