Analysis
-
max time kernel
129s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2022 10:34
Static task
static1
Behavioral task
behavioral1
Sample
dfbb366d3baf00e417315b6c6a2942c3dcddb1649bf6a239d57cea0748f03ab5.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
dfbb366d3baf00e417315b6c6a2942c3dcddb1649bf6a239d57cea0748f03ab5.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
dfbb366d3baf00e417315b6c6a2942c3dcddb1649bf6a239d57cea0748f03ab5.dll
-
Size
4KB
-
MD5
6b3e95e2d3571de1539a75311beda56d
-
SHA1
9ac029f2681ff767c39b0c2052436de35d970ce6
-
SHA256
dfbb366d3baf00e417315b6c6a2942c3dcddb1649bf6a239d57cea0748f03ab5
-
SHA512
2a6da84d022649a6bc0838ada02f82ace3ce862f07de33a21a87c0324cb5966b686e084792b7021f14cb28d77aa33fc49141caf5e9b3aad040e1da76248134e6
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4380 wrote to memory of 4052 4380 rundll32.exe 81 PID 4380 wrote to memory of 4052 4380 rundll32.exe 81 PID 4380 wrote to memory of 4052 4380 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dfbb366d3baf00e417315b6c6a2942c3dcddb1649bf6a239d57cea0748f03ab5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dfbb366d3baf00e417315b6c6a2942c3dcddb1649bf6a239d57cea0748f03ab5.dll,#12⤵PID:4052
-