Analysis
-
max time kernel
178s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
9c1616fd0ed06aed1dd54e062f856ab535945cc0b8b80dfd29d641d4f3b3ccd3.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
9c1616fd0ed06aed1dd54e062f856ab535945cc0b8b80dfd29d641d4f3b3ccd3.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
9c1616fd0ed06aed1dd54e062f856ab535945cc0b8b80dfd29d641d4f3b3ccd3.dll
-
Size
3KB
-
MD5
0728fab1ba81b72ed0356a2c5061d5f0
-
SHA1
66b1435f0e41f35f3dc929563a54c2c6d594da29
-
SHA256
9c1616fd0ed06aed1dd54e062f856ab535945cc0b8b80dfd29d641d4f3b3ccd3
-
SHA512
d4aaa123675cae8e6ec3e6047ade1f5786d715c5f43a98c8abb917e4ac548d8431643f1c58da6b7d6ec3fe4096ae871c70c8229291ae7ee953b975e1ca021ed7
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4448 wrote to memory of 2040 4448 rundll32.exe 81 PID 4448 wrote to memory of 2040 4448 rundll32.exe 81 PID 4448 wrote to memory of 2040 4448 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c1616fd0ed06aed1dd54e062f856ab535945cc0b8b80dfd29d641d4f3b3ccd3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c1616fd0ed06aed1dd54e062f856ab535945cc0b8b80dfd29d641d4f3b3ccd3.dll,#12⤵PID:2040
-