Analysis
-
max time kernel
144s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 05:04
Behavioral task
behavioral1
Sample
60b747b01c0416376cfeb5b299661045bf82086fd4325db42a442a95e2d11495.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
60b747b01c0416376cfeb5b299661045bf82086fd4325db42a442a95e2d11495.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
60b747b01c0416376cfeb5b299661045bf82086fd4325db42a442a95e2d11495.dll
-
Size
66KB
-
MD5
13cc9bd3657eaaee3abfa1bc019e6fe0
-
SHA1
50f1c641fe3ca9305bb4fe74b70a6bfd03412e0c
-
SHA256
60b747b01c0416376cfeb5b299661045bf82086fd4325db42a442a95e2d11495
-
SHA512
80c0d4087c1416ed24958cf1e1ee201d78e07c89d63cf6d0d99663bfee33f0515acf54737a7dee8c87bf52456a5d64d67e576ecb78662f7a195583b559d9a8bf
-
SSDEEP
1536:ev0DdicyAQKgovLMP4VdGzVbaI0R3vKzN4tEh+q9KIF:LdlyAQK/LMAG763vKdMq9n
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1436 wrote to memory of 3328 1436 rundll32.exe 80 PID 1436 wrote to memory of 3328 1436 rundll32.exe 80 PID 1436 wrote to memory of 3328 1436 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60b747b01c0416376cfeb5b299661045bf82086fd4325db42a442a95e2d11495.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60b747b01c0416376cfeb5b299661045bf82086fd4325db42a442a95e2d11495.dll,#12⤵PID:3328
-