Analysis
-
max time kernel
91s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 21:55
Behavioral task
behavioral1
Sample
d5c02c6ff3ac1adc8e75b6e74b157ef8a78b9bcc83086f4edbe9787e4348208a.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d5c02c6ff3ac1adc8e75b6e74b157ef8a78b9bcc83086f4edbe9787e4348208a.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
d5c02c6ff3ac1adc8e75b6e74b157ef8a78b9bcc83086f4edbe9787e4348208a.dll
-
Size
46KB
-
MD5
537d1760458cf9e9e207217bdb233cc0
-
SHA1
37845db490003e4a6b83c5ab06a2245b09c75938
-
SHA256
d5c02c6ff3ac1adc8e75b6e74b157ef8a78b9bcc83086f4edbe9787e4348208a
-
SHA512
d7bbca8c003d611a454934a2b08d30017bc5893e86fe638ed8fa4a420c00fb6d081d4212781db6b422916358d7aef40b279443aaa22928ae94e6f93b988b9a90
-
SSDEEP
768:9xBtKtqyLUM4fGk4CfSjjI51ggvy9xGJaAeFk94Ihr3LdkhC:9W4d4CaY5Ogvy9IJaAeFO4Ihj2A
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3204 wrote to memory of 4388 3204 rundll32.exe 80 PID 3204 wrote to memory of 4388 3204 rundll32.exe 80 PID 3204 wrote to memory of 4388 3204 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5c02c6ff3ac1adc8e75b6e74b157ef8a78b9bcc83086f4edbe9787e4348208a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5c02c6ff3ac1adc8e75b6e74b157ef8a78b9bcc83086f4edbe9787e4348208a.dll,#12⤵PID:4388
-