Analysis
-
max time kernel
92s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
04f71fdf02db93a8c57b9fd52ee720a2fe40cfef2f37bdd79819e5e0f0549d7d.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
04f71fdf02db93a8c57b9fd52ee720a2fe40cfef2f37bdd79819e5e0f0549d7d.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
04f71fdf02db93a8c57b9fd52ee720a2fe40cfef2f37bdd79819e5e0f0549d7d.dll
-
Size
77KB
-
MD5
75be29c037e3faca326e6d6f4d3772b0
-
SHA1
d8f4069275141c15948d8ad13de76553c0c05be6
-
SHA256
04f71fdf02db93a8c57b9fd52ee720a2fe40cfef2f37bdd79819e5e0f0549d7d
-
SHA512
db40aa21fd654a37febc2cf0df27f1717e28d9c3aa787e74e9cbcc4205e3e58de4b89b5bffbb30eabe4126876ad287c973a4cc54c2a7cb7776f09b9ca954782c
-
SSDEEP
1536:ccWmsuL8yN4xoi0AcR73fc8vsWjcduUiIqZ:RWUAJaQuUiXZ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4768 wrote to memory of 5080 4768 rundll32.exe 82 PID 4768 wrote to memory of 5080 4768 rundll32.exe 82 PID 4768 wrote to memory of 5080 4768 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04f71fdf02db93a8c57b9fd52ee720a2fe40cfef2f37bdd79819e5e0f0549d7d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04f71fdf02db93a8c57b9fd52ee720a2fe40cfef2f37bdd79819e5e0f0549d7d.dll,#12⤵PID:5080
-