Analysis
-
max time kernel
83s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 08:48
Behavioral task
behavioral1
Sample
31ab7cbf0c3540155b9cbd91a5d062a4fc9169bbfc4d0f292e09d84a37ff093c.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
31ab7cbf0c3540155b9cbd91a5d062a4fc9169bbfc4d0f292e09d84a37ff093c.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
31ab7cbf0c3540155b9cbd91a5d062a4fc9169bbfc4d0f292e09d84a37ff093c.dll
-
Size
91KB
-
MD5
6889e815a9267830d90364b4eb8e5c26
-
SHA1
b6091799f8a516fe910fbba0726f34f20867991a
-
SHA256
31ab7cbf0c3540155b9cbd91a5d062a4fc9169bbfc4d0f292e09d84a37ff093c
-
SHA512
df7d304f2f00d19ca5039d8d9d266f176e82a0eb4ae0e5c8079b6751a4e05907b411625b12ffcfdbbd6471c318e6de436233bf43718829a82c04d490aaea00dc
-
SSDEEP
1536:Zn4Mi33LS7enDxBxBkQhWNQgVVxceFZEcI0aUDY9XR:Zfi3b8enD3xBT0agUYEcIZMY9h
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1540 wrote to memory of 380 1540 rundll32.exe 83 PID 1540 wrote to memory of 380 1540 rundll32.exe 83 PID 1540 wrote to memory of 380 1540 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31ab7cbf0c3540155b9cbd91a5d062a4fc9169bbfc4d0f292e09d84a37ff093c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31ab7cbf0c3540155b9cbd91a5d062a4fc9169bbfc4d0f292e09d84a37ff093c.dll,#12⤵PID:380
-