Analysis
-
max time kernel
144s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 16:39
Behavioral task
behavioral1
Sample
30341ba81edd8a10a0935b38195357a026125bdc38a5dd2966f9891c508c93dc.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
30341ba81edd8a10a0935b38195357a026125bdc38a5dd2966f9891c508c93dc.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
30341ba81edd8a10a0935b38195357a026125bdc38a5dd2966f9891c508c93dc.dll
-
Size
86KB
-
MD5
8366c911649d2b7a95590edf56a49878
-
SHA1
04a6cf902a6a382a97cb021d247551d7ff8e2201
-
SHA256
30341ba81edd8a10a0935b38195357a026125bdc38a5dd2966f9891c508c93dc
-
SHA512
b94c5a684afe2d96f23eb1459c6be9a7048a27a628b48b7918528f970d6c5cf5d3dc2b4a9faab4957e9ff8ee981befc1a00057c14c9d693b51c430055d9549b5
-
SSDEEP
1536:zTNy9IRGQLGrFQhKoAoZE8U67xLyHwCao0RH9+Ml4zJ4eGaxdJSbukoW:z5rLGrFQkpoZE8UIZ/Rdt1JSdJSSW
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1796 wrote to memory of 4900 1796 rundll32.exe 80 PID 1796 wrote to memory of 4900 1796 rundll32.exe 80 PID 1796 wrote to memory of 4900 1796 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30341ba81edd8a10a0935b38195357a026125bdc38a5dd2966f9891c508c93dc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30341ba81edd8a10a0935b38195357a026125bdc38a5dd2966f9891c508c93dc.dll,#12⤵PID:4900
-