Analysis
-
max time kernel
28s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
a050a17b7b4275b66fbfb54463b1f5a029676cc3d44464d83b7a48ce7f3a1154.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a050a17b7b4275b66fbfb54463b1f5a029676cc3d44464d83b7a48ce7f3a1154.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
a050a17b7b4275b66fbfb54463b1f5a029676cc3d44464d83b7a48ce7f3a1154.dll
-
Size
98KB
-
MD5
8442d5053455b233b3009b046b662d35
-
SHA1
a9fecad7e3ae9c9e47e63cdf15c1a8aab1c7780b
-
SHA256
a050a17b7b4275b66fbfb54463b1f5a029676cc3d44464d83b7a48ce7f3a1154
-
SHA512
80149614ce2ee0c475bcc7ecfb0399795e35e81e0eb05876ac064bba01d8810fd0ed1133a335e22ff83be5e9a354d555d96520b94b66999c77b9b9a3c8a67de5
-
SSDEEP
3072:IYBTxIh+VUl0TVfPj49uQ3Obo30AIUb8i:IYBTWoV60T5r4YboEAnb
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a050a17b7b4275b66fbfb54463b1f5a029676cc3d44464d83b7a48ce7f3a1154.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a050a17b7b4275b66fbfb54463b1f5a029676cc3d44464d83b7a48ce7f3a1154.dll,#12⤵PID:884
-