Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 07:47
Behavioral task
behavioral1
Sample
9761f92910cb375609e19edb8d521090b12efb452db70f2bc53037831a6e79a3.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
9761f92910cb375609e19edb8d521090b12efb452db70f2bc53037831a6e79a3.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
9761f92910cb375609e19edb8d521090b12efb452db70f2bc53037831a6e79a3.dll
-
Size
111KB
-
MD5
54ee8dd93a91c23cac1005f91f2822a0
-
SHA1
1c6da986df665ee544268d58cfb3e35a0193f88a
-
SHA256
9761f92910cb375609e19edb8d521090b12efb452db70f2bc53037831a6e79a3
-
SHA512
8200bddfc7b2f925afe7ae06f7ad9f200f93f67afcb5057f25e33b935abaa1e3ec988639baf48456b9df92a0338f5dba0ffab13eb0853b7eaf329ed8146c7a5c
-
SSDEEP
1536:gYvRN3uV/DD8eEznhBbgA6U616t387sjJpd6OKbLaNKPiN:DvvKIXjhA1YMojJiOOLaNKPiN
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4540 wrote to memory of 4644 4540 rundll32.exe 83 PID 4540 wrote to memory of 4644 4540 rundll32.exe 83 PID 4540 wrote to memory of 4644 4540 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9761f92910cb375609e19edb8d521090b12efb452db70f2bc53037831a6e79a3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9761f92910cb375609e19edb8d521090b12efb452db70f2bc53037831a6e79a3.dll,#12⤵PID:4644
-