Analysis
-
max time kernel
163s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 05:25
Static task
static1
Behavioral task
behavioral1
Sample
1164d23fd9cb2afc88d5b1cd64fbaa9edc4c95edbe36fc3fdc0c5fdf1b0746a8.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1164d23fd9cb2afc88d5b1cd64fbaa9edc4c95edbe36fc3fdc0c5fdf1b0746a8.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
1164d23fd9cb2afc88d5b1cd64fbaa9edc4c95edbe36fc3fdc0c5fdf1b0746a8.dll
-
Size
31KB
-
MD5
ea87df9b0e17e23de6c3751ee4095250
-
SHA1
0f970f5d853646d1acf48ae3f3bd9ce1e87e2d3b
-
SHA256
1164d23fd9cb2afc88d5b1cd64fbaa9edc4c95edbe36fc3fdc0c5fdf1b0746a8
-
SHA512
378992e996737b95426e7859e8faf1a5e139b28fe5655e94c10c807d16f006847d7cef5ced06f7131541c7cc2bbabfd8bb9b1c9b9fa06228c602d97212a01b01
-
SSDEEP
192:VRRQmkmHk+NIlKa1O0xMtMNwbHEcvTum8:VRPkGkDKWO0YJjEAum
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4320 wrote to memory of 3540 4320 rundll32.exe 79 PID 4320 wrote to memory of 3540 4320 rundll32.exe 79 PID 4320 wrote to memory of 3540 4320 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1164d23fd9cb2afc88d5b1cd64fbaa9edc4c95edbe36fc3fdc0c5fdf1b0746a8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1164d23fd9cb2afc88d5b1cd64fbaa9edc4c95edbe36fc3fdc0c5fdf1b0746a8.dll,#12⤵PID:3540
-