Analysis
-
max time kernel
197s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
75fdfa018afaf71079ff5920a67144db3beeec91b36cf437552bfd0f7cfd684d.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
75fdfa018afaf71079ff5920a67144db3beeec91b36cf437552bfd0f7cfd684d.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
75fdfa018afaf71079ff5920a67144db3beeec91b36cf437552bfd0f7cfd684d.dll
-
Size
3KB
-
MD5
4486f935829e5c85f60b87d0a9d005a0
-
SHA1
e124e42fdfc96da1993ef3eb190e52c7c6b7701b
-
SHA256
75fdfa018afaf71079ff5920a67144db3beeec91b36cf437552bfd0f7cfd684d
-
SHA512
eac30e6e2f25ab1740be530be6ce55817c1ea3b79af172685f0cf7975a9139cf1fc135ac510a707a3da569578a91afb7e132d61c9d773a492bcf32e8d9efed45
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1432 wrote to memory of 744 1432 rundll32.exe 83 PID 1432 wrote to memory of 744 1432 rundll32.exe 83 PID 1432 wrote to memory of 744 1432 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75fdfa018afaf71079ff5920a67144db3beeec91b36cf437552bfd0f7cfd684d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75fdfa018afaf71079ff5920a67144db3beeec91b36cf437552bfd0f7cfd684d.dll,#12⤵PID:744
-