Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 20:41
Static task
static1
Behavioral task
behavioral1
Sample
493201e05f7e56b5340e96b3ed2b62c77707a1728a6f043e3b8f163820efba18.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
493201e05f7e56b5340e96b3ed2b62c77707a1728a6f043e3b8f163820efba18.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
493201e05f7e56b5340e96b3ed2b62c77707a1728a6f043e3b8f163820efba18.dll
-
Size
6KB
-
MD5
a0af91abec1282b8fd811bf3485db64c
-
SHA1
36a0df4f08f80e8854387fbd6140af65f6ab5917
-
SHA256
493201e05f7e56b5340e96b3ed2b62c77707a1728a6f043e3b8f163820efba18
-
SHA512
00a76c51a86eda68cb499931d2e2daed6a65e192a3025bc60fd8f426ba0168bfe59ed569a15326b3afe4a925d9053ea5a57938ac77705386465095a85196a312
-
SSDEEP
96:nEY2RrF1eqwi4BojQlvdiAZGt8jpCpkNzELc3:EHRh1eppe6GKjc+d
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3912 4764 rundll32.exe 82 PID 4764 wrote to memory of 3912 4764 rundll32.exe 82 PID 4764 wrote to memory of 3912 4764 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\493201e05f7e56b5340e96b3ed2b62c77707a1728a6f043e3b8f163820efba18.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\493201e05f7e56b5340e96b3ed2b62c77707a1728a6f043e3b8f163820efba18.dll,#12⤵PID:3912
-