Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 04:21
Behavioral task
behavioral1
Sample
7705a81bb131a9335039af6153b90bf11ed87b7816fdff30034d6aa214d43c0e.dll
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7705a81bb131a9335039af6153b90bf11ed87b7816fdff30034d6aa214d43c0e.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
7705a81bb131a9335039af6153b90bf11ed87b7816fdff30034d6aa214d43c0e.dll
-
Size
102KB
-
MD5
24177b2ad89fef6aecd34d2b2452fc5a
-
SHA1
8d552c440e53153e16f72aff9132ec700cebe2e0
-
SHA256
7705a81bb131a9335039af6153b90bf11ed87b7816fdff30034d6aa214d43c0e
-
SHA512
8f7e37eb87979392baff88ff642f4162377c1200f6ad17aa69114844d7208ee9aa93c2c5cee37eaa91cde0e13b22a3a133ae4fa12c282d41be6b24c65e014a99
-
SSDEEP
3072:LmFty1L8gDyOpk7cOCt2k1mfsTx7sh4sQVq:LUty1FyqkrCtF14624sQY
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4648 wrote to memory of 2532 4648 rundll32.exe 34 PID 4648 wrote to memory of 2532 4648 rundll32.exe 34 PID 4648 wrote to memory of 2532 4648 rundll32.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7705a81bb131a9335039af6153b90bf11ed87b7816fdff30034d6aa214d43c0e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7705a81bb131a9335039af6153b90bf11ed87b7816fdff30034d6aa214d43c0e.dll,#12⤵PID:2532
-