Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 08:05
Behavioral task
behavioral1
Sample
30dee4d8bc635d90671f78228bc519318b71f07ba1e958c94e2de3b165078644.dll
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
30dee4d8bc635d90671f78228bc519318b71f07ba1e958c94e2de3b165078644.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
30dee4d8bc635d90671f78228bc519318b71f07ba1e958c94e2de3b165078644.dll
-
Size
12KB
-
MD5
4ce7458c5e6c370dc8aceb12826408b0
-
SHA1
9d9a8ae9e7d26e2678c00913d337cf2864edcce4
-
SHA256
30dee4d8bc635d90671f78228bc519318b71f07ba1e958c94e2de3b165078644
-
SHA512
d3ee39aed49920b1f8e2189d229aefc74f295d6a4df3855dc141454af5059a0dd33e5c2c8b1d73441dfbf41697fe22211d7fc5e0e92de9027fac90b607d475e3
-
SSDEEP
192:0AqObz3mDHCLGnZNKeSIfoM2GawqFi6AzryJlFzzrBo+VQaHBzfo9OXsL:bbz3IDK1IyZ86AzgFzzrBf7JXQ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27 PID 1380 wrote to memory of 1672 1380 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30dee4d8bc635d90671f78228bc519318b71f07ba1e958c94e2de3b165078644.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30dee4d8bc635d90671f78228bc519318b71f07ba1e958c94e2de3b165078644.dll,#12⤵PID:1672
-