Analysis
-
max time kernel
172s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:06
Static task
static1
Behavioral task
behavioral1
Sample
9790452393c8854dc8da507d5941c1d6576ca56070431abfa4888f91ed2071db.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
9790452393c8854dc8da507d5941c1d6576ca56070431abfa4888f91ed2071db.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
9790452393c8854dc8da507d5941c1d6576ca56070431abfa4888f91ed2071db.dll
-
Size
3KB
-
MD5
070212cddd7ca38649de5d6803b1487d
-
SHA1
d740ed9300d5754de7b44ebeabca84d4373341ea
-
SHA256
9790452393c8854dc8da507d5941c1d6576ca56070431abfa4888f91ed2071db
-
SHA512
a65428548feada9c7bfda3a19332d6e450742423187c45dfbe069e01dc889f1d7e54884e1fbf91381d52da85167fa4b9a95b5e4e23b5404f54fc18ed5f88166a
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 460 wrote to memory of 3668 460 rundll32.exe 84 PID 460 wrote to memory of 3668 460 rundll32.exe 84 PID 460 wrote to memory of 3668 460 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9790452393c8854dc8da507d5941c1d6576ca56070431abfa4888f91ed2071db.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9790452393c8854dc8da507d5941c1d6576ca56070431abfa4888f91ed2071db.dll,#12⤵PID:3668
-