Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 04:04
Static task
static1
Behavioral task
behavioral1
Sample
a361302fff7dfe45498f3d1250a04c8750d8a1a6ca3a1063b645277d133d9c75.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a361302fff7dfe45498f3d1250a04c8750d8a1a6ca3a1063b645277d133d9c75.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a361302fff7dfe45498f3d1250a04c8750d8a1a6ca3a1063b645277d133d9c75.dll
-
Size
72KB
-
MD5
495a3c0517d564a8bd49de157f9d8870
-
SHA1
6238f241a3da5085e982e4b5c254b51a75b10017
-
SHA256
a361302fff7dfe45498f3d1250a04c8750d8a1a6ca3a1063b645277d133d9c75
-
SHA512
b8123ad83e7fae0f2246cd5e14c604343b8df6fe21e2daf395b311ca710a410f2a9efa1cddc4d1900ae5bb747c5b4b6d4b830ab2a79894af9fc9b719b7f141bd
-
SSDEEP
1536:T1A/sl3WhuF6r+BtvNPapRJYg8TRGflxd:TOwWhw6SjNa96Gflx
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3600 wrote to memory of 4736 3600 rundll32.exe 83 PID 3600 wrote to memory of 4736 3600 rundll32.exe 83 PID 3600 wrote to memory of 4736 3600 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a361302fff7dfe45498f3d1250a04c8750d8a1a6ca3a1063b645277d133d9c75.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a361302fff7dfe45498f3d1250a04c8750d8a1a6ca3a1063b645277d133d9c75.dll,#12⤵PID:4736
-