Analysis
-
max time kernel
91s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 07:39
Behavioral task
behavioral1
Sample
f26ee3bfa476f741379ee018545ecbb720ca27ea77cc06d83f5ef0324e58d4f8.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
f26ee3bfa476f741379ee018545ecbb720ca27ea77cc06d83f5ef0324e58d4f8.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
f26ee3bfa476f741379ee018545ecbb720ca27ea77cc06d83f5ef0324e58d4f8.dll
-
Size
62KB
-
MD5
45f6905e99e183f1b022091dc0036f20
-
SHA1
3622fa3ba835ad0cb74d2aaa6f0521890fddf19c
-
SHA256
f26ee3bfa476f741379ee018545ecbb720ca27ea77cc06d83f5ef0324e58d4f8
-
SHA512
70feed0f352ea10521742ed07a2f8794a8ca90973ff91f7c18ddb0e99b270ed1346582387b2095b05f3780c99d122a3b137d5695fbfcd2e664c65ae8a3ebba0d
-
SSDEEP
1536:Bm1NGJVGk+ZTPjAQ/mKASdU3iUSIiS718Z05u/p90V:kX0VZ4Tjnd1bIic405u/p90V
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1448 1232 rundll32.exe 81 PID 1232 wrote to memory of 1448 1232 rundll32.exe 81 PID 1232 wrote to memory of 1448 1232 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f26ee3bfa476f741379ee018545ecbb720ca27ea77cc06d83f5ef0324e58d4f8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f26ee3bfa476f741379ee018545ecbb720ca27ea77cc06d83f5ef0324e58d4f8.dll,#12⤵PID:1448
-