Analysis
-
max time kernel
91s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 07:48
Behavioral task
behavioral1
Sample
750808cdcd8341be6f561f5629f51ad4ae7b6ddb633e661f7f05e28315a17649.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
750808cdcd8341be6f561f5629f51ad4ae7b6ddb633e661f7f05e28315a17649.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
750808cdcd8341be6f561f5629f51ad4ae7b6ddb633e661f7f05e28315a17649.dll
-
Size
113KB
-
MD5
07c96adeaa936fe1a44f307443a67e42
-
SHA1
5d986cb58450497625d245358b37fa04bd439445
-
SHA256
750808cdcd8341be6f561f5629f51ad4ae7b6ddb633e661f7f05e28315a17649
-
SHA512
701b0442893d5b902813ecaa5da685e0bbfe58017dd1a6215bca9127854f3d78eb263d90fb15b7066ba61140718850d842342c35f578013b94cd621c730b9bde
-
SSDEEP
1536:gYvRN3uV/DD8eEznhBbgA6U616t9Iwol/u4oulzQdb7YI6JOQMSl2y/D:DvvKIXjhA1YsZZAYI1QMPY
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2296 2068 rundll32.exe 82 PID 2068 wrote to memory of 2296 2068 rundll32.exe 82 PID 2068 wrote to memory of 2296 2068 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\750808cdcd8341be6f561f5629f51ad4ae7b6ddb633e661f7f05e28315a17649.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\750808cdcd8341be6f561f5629f51ad4ae7b6ddb633e661f7f05e28315a17649.dll,#12⤵PID:2296
-