Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 18:48
Behavioral task
behavioral1
Sample
d7679d70c4dea03dc8873bd058a2c33d5f79846b09ce482678cc9c368554b2a6.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d7679d70c4dea03dc8873bd058a2c33d5f79846b09ce482678cc9c368554b2a6.dll
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
d7679d70c4dea03dc8873bd058a2c33d5f79846b09ce482678cc9c368554b2a6.dll
-
Size
63KB
-
MD5
0bcbf3ae5546c5e4e6b67bd308d7acb3
-
SHA1
11658a0edaec062888527f0bc9a4e45e6fd86c6e
-
SHA256
d7679d70c4dea03dc8873bd058a2c33d5f79846b09ce482678cc9c368554b2a6
-
SHA512
7ae1954f5ea436c3ab27b7c329075db0b49b53f02ce3b944ae4f6d9ddaca603343aa9a0e82e59f287c67ffee9c8dab3e085c98a8b0ae14e29a4119d9717eac82
-
SSDEEP
1536:DVV1HTT/eF7ashEjES6knf53GJ9RASqJQQ14ktf:DVr0Tg6kx3G/RAvaQ1Vf
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4252 wrote to memory of 1312 4252 rundll32.exe 81 PID 4252 wrote to memory of 1312 4252 rundll32.exe 81 PID 4252 wrote to memory of 1312 4252 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7679d70c4dea03dc8873bd058a2c33d5f79846b09ce482678cc9c368554b2a6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7679d70c4dea03dc8873bd058a2c33d5f79846b09ce482678cc9c368554b2a6.dll,#12⤵PID:1312
-