Analysis
-
max time kernel
91s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 23:15
Behavioral task
behavioral1
Sample
23d1508da4708a18a6f4696bc311de68be3b3454f7ee93c50a4961c53d7056f9.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
23d1508da4708a18a6f4696bc311de68be3b3454f7ee93c50a4961c53d7056f9.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
23d1508da4708a18a6f4696bc311de68be3b3454f7ee93c50a4961c53d7056f9.dll
-
Size
54KB
-
MD5
66092232d94c240ac77aee21403f12ad
-
SHA1
d01191406dcf19a7c50e8a6bec809d9863ccc6a8
-
SHA256
23d1508da4708a18a6f4696bc311de68be3b3454f7ee93c50a4961c53d7056f9
-
SHA512
75d89eb84c0c9eabcd485b4d75ecced0c14f3bc75eae1344d47e2e82d8e2efe42ab7cd5b85c0adea7403dac2d2cbe1a47b483a4860f44ab833a0dd7047be2cba
-
SSDEEP
768:Gx4m7JNSll3dTG+FA13Py/hZDth3ydkiaFgim6Bgxp4G+LKLBJvYyCakbhW+w:Bm1NGJVGlVPUDP3ZJgx/FdiyCaMO
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1936 2248 rundll32.exe 81 PID 2248 wrote to memory of 1936 2248 rundll32.exe 81 PID 2248 wrote to memory of 1936 2248 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23d1508da4708a18a6f4696bc311de68be3b3454f7ee93c50a4961c53d7056f9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23d1508da4708a18a6f4696bc311de68be3b3454f7ee93c50a4961c53d7056f9.dll,#12⤵PID:1936
-