Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 05:02
Behavioral task
behavioral1
Sample
50acbf7adfba548ea1749eb7e306935c154ee5fedca341f23e62045b680615b9.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
50acbf7adfba548ea1749eb7e306935c154ee5fedca341f23e62045b680615b9.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
50acbf7adfba548ea1749eb7e306935c154ee5fedca341f23e62045b680615b9.dll
-
Size
62KB
-
MD5
08615ac6b866b199319ee3d75402fc90
-
SHA1
222488f93ebdad5c843c1610a7b8711468133b8c
-
SHA256
50acbf7adfba548ea1749eb7e306935c154ee5fedca341f23e62045b680615b9
-
SHA512
fc4f8503fa7642201595888969fff5c791efe01db270d62ba95502ce53134ffb29881370f540c3c1ac87d36ff662bb9812c2c7bd176876d039b43e71c9b8f8b7
-
SSDEEP
1536:EGxOhVtAl+qi5gn4Tmpt9wgbgIv8x9OdjF3i3eK:EG4tHqgE4TIwwld53i3L
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4408 wrote to memory of 3036 4408 rundll32.exe 82 PID 4408 wrote to memory of 3036 4408 rundll32.exe 82 PID 4408 wrote to memory of 3036 4408 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50acbf7adfba548ea1749eb7e306935c154ee5fedca341f23e62045b680615b9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50acbf7adfba548ea1749eb7e306935c154ee5fedca341f23e62045b680615b9.dll,#12⤵PID:3036
-