Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 09:32
Static task
static1
Behavioral task
behavioral1
Sample
20400ea1486a2bccdc2f1b0ac1b73bc3f7d04a1816e0db63dc13c61a6e70b15c.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
20400ea1486a2bccdc2f1b0ac1b73bc3f7d04a1816e0db63dc13c61a6e70b15c.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
20400ea1486a2bccdc2f1b0ac1b73bc3f7d04a1816e0db63dc13c61a6e70b15c.dll
-
Size
63KB
-
MD5
22c80b3bfc3f90d2d797fcfa2dce375a
-
SHA1
2ba3d6a8d4f10b25d4978c6624b6eb830e287833
-
SHA256
20400ea1486a2bccdc2f1b0ac1b73bc3f7d04a1816e0db63dc13c61a6e70b15c
-
SHA512
e9499a5f385754a970e8ecd2ff8d2e796169d0b29e0f8138219793bc3ab258649271e8c0cfb3a8fb83e966efa4128e40c284b695e5600712d0ecfa341e664c7d
-
SSDEEP
768:yl8Qf07cV72m/hop856PSndBSQnI6GpDGBiL:S07ch41Sd8QI9pDI
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27 PID 1468 wrote to memory of 1496 1468 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20400ea1486a2bccdc2f1b0ac1b73bc3f7d04a1816e0db63dc13c61a6e70b15c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20400ea1486a2bccdc2f1b0ac1b73bc3f7d04a1816e0db63dc13c61a6e70b15c.dll,#12⤵PID:1496
-