Analysis
-
max time kernel
159s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 20:01
Behavioral task
behavioral1
Sample
9fe9c9082e005fabd859b8e1daea02184a2d0e8a8b9a20b1b0b1633bf23574d6.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
9fe9c9082e005fabd859b8e1daea02184a2d0e8a8b9a20b1b0b1633bf23574d6.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
9fe9c9082e005fabd859b8e1daea02184a2d0e8a8b9a20b1b0b1633bf23574d6.dll
-
Size
95KB
-
MD5
843341738995d98ad978019f926f0123
-
SHA1
d4446e5d98475eed7eb6f64425acb0476a2f4ca0
-
SHA256
9fe9c9082e005fabd859b8e1daea02184a2d0e8a8b9a20b1b0b1633bf23574d6
-
SHA512
516aaf0341fc98bc22d0bf04f9cda639f92a93ea6c7438c808bf0a1e2ea77cc2220ad95f0da7d67dffd3a77d9351e8f5cb65ca3c9e65996a379a6edbf796686a
-
SSDEEP
1536:+l2owFH4ZYhUTVS65Uq8QpfYbTph4H6EISDntcTlNSbCKAi:ihwxZ+w65DRYL4TDWTlNSF
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4384 4644 rundll32.exe 82 PID 4644 wrote to memory of 4384 4644 rundll32.exe 82 PID 4644 wrote to memory of 4384 4644 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9fe9c9082e005fabd859b8e1daea02184a2d0e8a8b9a20b1b0b1633bf23574d6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9fe9c9082e005fabd859b8e1daea02184a2d0e8a8b9a20b1b0b1633bf23574d6.dll,#12⤵PID:4384
-