Analysis
-
max time kernel
170s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 01:05
Behavioral task
behavioral1
Sample
41066380b0733b27ad405312c2eaabace20660e47827dc6f9e7b8f8cda1b379e.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
41066380b0733b27ad405312c2eaabace20660e47827dc6f9e7b8f8cda1b379e.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
41066380b0733b27ad405312c2eaabace20660e47827dc6f9e7b8f8cda1b379e.dll
-
Size
67KB
-
MD5
40fad1067c477b229a77b6f5d1b705cd
-
SHA1
36baf350012cdc1a916c9ab9010ee288b72e2f2f
-
SHA256
41066380b0733b27ad405312c2eaabace20660e47827dc6f9e7b8f8cda1b379e
-
SHA512
ba75169904c43a734d0aa114a008cdd3a2f9595c85ac8fec48de80d54dedda93cd5cc472747d55f424211e1bb5812420b1ea276414c11a21ea35e6bf4ece61a2
-
SSDEEP
1536:8nrxDussGn4AAejPC7Mp/c+HJgKKtLhVuDvRP+:y6tV0pk+pgRLPuD5+
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2344 1812 rundll32.exe 79 PID 1812 wrote to memory of 2344 1812 rundll32.exe 79 PID 1812 wrote to memory of 2344 1812 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41066380b0733b27ad405312c2eaabace20660e47827dc6f9e7b8f8cda1b379e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41066380b0733b27ad405312c2eaabace20660e47827dc6f9e7b8f8cda1b379e.dll,#12⤵PID:2344
-