Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 04:19
Behavioral task
behavioral1
Sample
7a3bc5523d77d4b69b3a27eb2cfc336e4bef9b1fc9825420be7fdb63eb1dcf92.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7a3bc5523d77d4b69b3a27eb2cfc336e4bef9b1fc9825420be7fdb63eb1dcf92.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
7a3bc5523d77d4b69b3a27eb2cfc336e4bef9b1fc9825420be7fdb63eb1dcf92.dll
-
Size
88KB
-
MD5
1d0c24d338b237fc884ae0eef63e2f66
-
SHA1
6e16e08f23eaa9c54ab16ff5a4e4ea068aa540c5
-
SHA256
7a3bc5523d77d4b69b3a27eb2cfc336e4bef9b1fc9825420be7fdb63eb1dcf92
-
SHA512
ecf953a2969791cfc4d00a17d3b5ac99c989bf0ef8793790a2ff82dc9929cece757bc10c9dbccf0e413ecf3ad67c8f4ef5d3cad09d09a5754b6aef3ee91ddb20
-
SSDEEP
1536:Xrj2DTisS3kalQUZpYShYiOKqg8XAysn+YO9Y7s:v2DTv1alQuZYi6gMYO9ws
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3736 wrote to memory of 4204 3736 rundll32.exe 82 PID 3736 wrote to memory of 4204 3736 rundll32.exe 82 PID 3736 wrote to memory of 4204 3736 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a3bc5523d77d4b69b3a27eb2cfc336e4bef9b1fc9825420be7fdb63eb1dcf92.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a3bc5523d77d4b69b3a27eb2cfc336e4bef9b1fc9825420be7fdb63eb1dcf92.dll,#12⤵PID:4204
-