Analysis
-
max time kernel
124s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2022, 17:16
Behavioral task
behavioral1
Sample
0ceeaadc65d69fc621f2017c81aa41035e3b940761e28f15f3ad83cad97f5dec.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ceeaadc65d69fc621f2017c81aa41035e3b940761e28f15f3ad83cad97f5dec.dll
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
0ceeaadc65d69fc621f2017c81aa41035e3b940761e28f15f3ad83cad97f5dec.dll
-
Size
107KB
-
MD5
6928d18af615064199e0da804519a8aa
-
SHA1
f46a8207e5593bfcd04e7cc3144b07883fad27ee
-
SHA256
0ceeaadc65d69fc621f2017c81aa41035e3b940761e28f15f3ad83cad97f5dec
-
SHA512
9e2c0bb3aae935766170b378b67dddbe0eaecd690f62d8fa14b8fe59d84cc9c82c976f562552f692a9532c526f17b7488415350b8c7fb2500952b1acf0778dd6
-
SSDEEP
3072:ARlNzx55pq8FLegECZsnptc6YEXrwZyBIfmm7e23:ARllx4KuCqpnrMZyBW7l
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2128 2032 rundll32.exe 84 PID 2032 wrote to memory of 2128 2032 rundll32.exe 84 PID 2032 wrote to memory of 2128 2032 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0ceeaadc65d69fc621f2017c81aa41035e3b940761e28f15f3ad83cad97f5dec.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0ceeaadc65d69fc621f2017c81aa41035e3b940761e28f15f3ad83cad97f5dec.dll,#12⤵PID:2128
-