Analysis
-
max time kernel
141s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 05:20
Static task
static1
Behavioral task
behavioral1
Sample
a65449799a93d7a14b8adaa2bc20931279846961efe5bf1a7b4dd8432b415b7a.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a65449799a93d7a14b8adaa2bc20931279846961efe5bf1a7b4dd8432b415b7a.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a65449799a93d7a14b8adaa2bc20931279846961efe5bf1a7b4dd8432b415b7a.dll
-
Size
3KB
-
MD5
908c61da882a0b9941614bf2c50f0860
-
SHA1
550e92e0a8090a30b4b876ce498df3726a46d376
-
SHA256
a65449799a93d7a14b8adaa2bc20931279846961efe5bf1a7b4dd8432b415b7a
-
SHA512
13506c8b686988a1a17cdf3d1ac24f0d7e2afb6860b953f6da5f0fad9b6921be7687dc37ffb965b261812a6c0cb918d12a7b547fc8dd80cb4d333d472398c8ca
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3616 wrote to memory of 4520 3616 rundll32.exe 82 PID 3616 wrote to memory of 4520 3616 rundll32.exe 82 PID 3616 wrote to memory of 4520 3616 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a65449799a93d7a14b8adaa2bc20931279846961efe5bf1a7b4dd8432b415b7a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a65449799a93d7a14b8adaa2bc20931279846961efe5bf1a7b4dd8432b415b7a.dll,#12⤵PID:4520
-