Analysis
-
max time kernel
152s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 00:57
Behavioral task
behavioral1
Sample
500b7699da30e5e5d069ddf5da2ee4cf7a30ea390b7232a489f5f464b325019e.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
500b7699da30e5e5d069ddf5da2ee4cf7a30ea390b7232a489f5f464b325019e.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
500b7699da30e5e5d069ddf5da2ee4cf7a30ea390b7232a489f5f464b325019e.dll
-
Size
67KB
-
MD5
1a34da862057ffc86ddabb4cf9758161
-
SHA1
f2533ca3e59e962516e8d28686fd101320353b28
-
SHA256
500b7699da30e5e5d069ddf5da2ee4cf7a30ea390b7232a489f5f464b325019e
-
SHA512
c4e850a83859226d87bba19f0939d16db53b9c24b1b7e3ede6f076f4a4b3f5ad4696910380fa7bb8be0b723c966a1f82a23f37652b5174bba93541c03341be40
-
SSDEEP
1536:7nrxDussGn4AAejPC7Mp/c+HJgKKWz3p/wBBw9:D6tV0pk+pg6t/EK9
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2540 1844 rundll32.exe 82 PID 1844 wrote to memory of 2540 1844 rundll32.exe 82 PID 1844 wrote to memory of 2540 1844 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\500b7699da30e5e5d069ddf5da2ee4cf7a30ea390b7232a489f5f464b325019e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\500b7699da30e5e5d069ddf5da2ee4cf7a30ea390b7232a489f5f464b325019e.dll,#12⤵PID:2540
-