Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
74e202a73297868e4051507eb2f7910f90e4ebf8f7a571bd204482438d512803.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
74e202a73297868e4051507eb2f7910f90e4ebf8f7a571bd204482438d512803.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
74e202a73297868e4051507eb2f7910f90e4ebf8f7a571bd204482438d512803.dll
-
Size
3KB
-
MD5
8125247545d745e86166780a2778d1ad
-
SHA1
8af95eec9d5a2646bf635ce21ca810fd58bef7df
-
SHA256
74e202a73297868e4051507eb2f7910f90e4ebf8f7a571bd204482438d512803
-
SHA512
5ad6ae20a2ef81a3b1bace5696585cb8795ae1d0a0856745a7db816d5131eb5f12e61f7e038c8e6ddbabedaefd425a978f9261198b17dfe29ec09767a8952503
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4192 wrote to memory of 3692 4192 rundll32.exe 82 PID 4192 wrote to memory of 3692 4192 rundll32.exe 82 PID 4192 wrote to memory of 3692 4192 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74e202a73297868e4051507eb2f7910f90e4ebf8f7a571bd204482438d512803.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74e202a73297868e4051507eb2f7910f90e4ebf8f7a571bd204482438d512803.dll,#12⤵PID:3692
-