Analysis
-
max time kernel
127s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 02:13
Behavioral task
behavioral1
Sample
4445f5b6c8b9aeecd29be63e93c43aeea53366c2d5ea99e184f3355beb8bf502.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4445f5b6c8b9aeecd29be63e93c43aeea53366c2d5ea99e184f3355beb8bf502.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
4445f5b6c8b9aeecd29be63e93c43aeea53366c2d5ea99e184f3355beb8bf502.dll
-
Size
4KB
-
MD5
8165e9da92b164b6c60ec89e0a3a7e30
-
SHA1
93987d74edd629b042d6be09ca63091861726fb7
-
SHA256
4445f5b6c8b9aeecd29be63e93c43aeea53366c2d5ea99e184f3355beb8bf502
-
SHA512
bac0df9e46e040058a2725ec43d1b022a3f2446cba66b4aa6b8b3bf94704b308885f539d969654471821c638507a925364472f37209dcb2ce9a8aa898a06e129
-
SSDEEP
48:a5zuMqBcq06phM/wwWLSeJY8JTa6Il+Lt1VpBBfgjjj+v3NgpxvLtreaGpDWm:TRphMzf8PjBBfM+3NSefpCm
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5100 wrote to memory of 4656 5100 rundll32.exe 81 PID 5100 wrote to memory of 4656 5100 rundll32.exe 81 PID 5100 wrote to memory of 4656 5100 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4445f5b6c8b9aeecd29be63e93c43aeea53366c2d5ea99e184f3355beb8bf502.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4445f5b6c8b9aeecd29be63e93c43aeea53366c2d5ea99e184f3355beb8bf502.dll,#12⤵PID:4656
-