Analysis
-
max time kernel
175s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 01:19
Static task
static1
Behavioral task
behavioral1
Sample
1630261193d00dc6f192e2db1939cc090fbec84aca15cd0440bb37105a31fdde.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1630261193d00dc6f192e2db1939cc090fbec84aca15cd0440bb37105a31fdde.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
1630261193d00dc6f192e2db1939cc090fbec84aca15cd0440bb37105a31fdde.dll
-
Size
28KB
-
MD5
57fa6f15e28810c1a1ca1b67288b6007
-
SHA1
4cac0b04819908f04927f4110523029ed715c923
-
SHA256
1630261193d00dc6f192e2db1939cc090fbec84aca15cd0440bb37105a31fdde
-
SHA512
1ac3038990bb8b21e01cde805a898819d24bbea0945bac3c7fc5b6c62d7572dbc22fcb6b8d354c8d68da6a2649ffab89f88371f6c3ca4fb6387d9468a5a0b3bf
-
SSDEEP
384:2yEuBlt+QUL0LNB7BUKpKqKT5JSIlGp9Dq:9tqL0z7dpK1rSIlGp9W
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4372 wrote to memory of 3084 4372 rundll32.exe 83 PID 4372 wrote to memory of 3084 4372 rundll32.exe 83 PID 4372 wrote to memory of 3084 4372 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1630261193d00dc6f192e2db1939cc090fbec84aca15cd0440bb37105a31fdde.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1630261193d00dc6f192e2db1939cc090fbec84aca15cd0440bb37105a31fdde.dll,#12⤵PID:3084
-