Analysis
-
max time kernel
91s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
5413e8e06cfef77d8acf1c0b683a6710e6629976e37876c572d9f492929f84ef.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5413e8e06cfef77d8acf1c0b683a6710e6629976e37876c572d9f492929f84ef.dll
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
5413e8e06cfef77d8acf1c0b683a6710e6629976e37876c572d9f492929f84ef.dll
-
Size
177KB
-
MD5
21b5b8267e0b23e173222ac4dab44e50
-
SHA1
4eff62f127a0a7569446e31ea3c8f2f105c37309
-
SHA256
5413e8e06cfef77d8acf1c0b683a6710e6629976e37876c572d9f492929f84ef
-
SHA512
4bfdc65f3c523ed43ce6e35fa39652a01c95ad9a994644f2d56940f349eb7d8699a37141171bcedd113a7857bdca67fb3bd7b4fe5703961988efb49459badd31
-
SSDEEP
3072:BMSyxvfGYK4t//NCGcwdSfNcnxZvZB57:WSQftKC/V9bwfNcnrz5
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 3852 4864 rundll32.exe 80 PID 4864 wrote to memory of 3852 4864 rundll32.exe 80 PID 4864 wrote to memory of 3852 4864 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5413e8e06cfef77d8acf1c0b683a6710e6629976e37876c572d9f492929f84ef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5413e8e06cfef77d8acf1c0b683a6710e6629976e37876c572d9f492929f84ef.dll,#12⤵PID:3852
-