Analysis
-
max time kernel
135s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 07:44
Behavioral task
behavioral1
Sample
c5a9315b1e6fdf4324bec69781559f01bb6527531279d76237386d4700c6c9ae.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c5a9315b1e6fdf4324bec69781559f01bb6527531279d76237386d4700c6c9ae.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
c5a9315b1e6fdf4324bec69781559f01bb6527531279d76237386d4700c6c9ae.dll
-
Size
78KB
-
MD5
93327554ddb204fc45b92ca64b457b73
-
SHA1
403946efc2f65ecd32741a7ebcf8e021b44bb7c1
-
SHA256
c5a9315b1e6fdf4324bec69781559f01bb6527531279d76237386d4700c6c9ae
-
SHA512
9422ec0028d666f2b759437897ba84156c91bad360cd8fb23dc41d72d63e6758fb9b2d03a862ca19e3cbbd3f67384a896276affdec1ae8d798da81dc786d14a2
-
SSDEEP
1536:yHZHUifjCJW2/bVt87wiDJDiLtPGdsxSrgBobzkcm:yH5rqW2OTdiLNGaSrwodm
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4628 wrote to memory of 5044 4628 rundll32.exe 82 PID 4628 wrote to memory of 5044 4628 rundll32.exe 82 PID 4628 wrote to memory of 5044 4628 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c5a9315b1e6fdf4324bec69781559f01bb6527531279d76237386d4700c6c9ae.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c5a9315b1e6fdf4324bec69781559f01bb6527531279d76237386d4700c6c9ae.dll,#12⤵PID:5044
-