Analysis
-
max time kernel
171s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
16c75231b0f4acb91f842e05a705bd1a19b240f58bacf8467cea561e47f30481.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
16c75231b0f4acb91f842e05a705bd1a19b240f58bacf8467cea561e47f30481.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
16c75231b0f4acb91f842e05a705bd1a19b240f58bacf8467cea561e47f30481.dll
-
Size
33KB
-
MD5
08dff9252d17c5a34285d295404ce8d0
-
SHA1
0b612a0511c4446086d25019334ca585ddba842b
-
SHA256
16c75231b0f4acb91f842e05a705bd1a19b240f58bacf8467cea561e47f30481
-
SHA512
030e01299e56b48db90704e399696c9d373bffd0b6e19a092f4a793e87347a0ffafc3006b5982840c8565b48b3f980155c471ddee3e0323842658165bcc83535
-
SSDEEP
768:6WPYvZLnZ0icDVov3Yq7pW/PB7cO6RER+v:LPYvZLnUVOb7pW/GRER+v
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4288 wrote to memory of 5012 4288 rundll32.exe 80 PID 4288 wrote to memory of 5012 4288 rundll32.exe 80 PID 4288 wrote to memory of 5012 4288 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16c75231b0f4acb91f842e05a705bd1a19b240f58bacf8467cea561e47f30481.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16c75231b0f4acb91f842e05a705bd1a19b240f58bacf8467cea561e47f30481.dll,#12⤵PID:5012
-