Analysis
-
max time kernel
173s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 04:57
Static task
static1
Behavioral task
behavioral1
Sample
60da17cf01d0681c19d4c2ac0cf45aea84866834c811b68f7df8955d12282b9a.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
60da17cf01d0681c19d4c2ac0cf45aea84866834c811b68f7df8955d12282b9a.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
60da17cf01d0681c19d4c2ac0cf45aea84866834c811b68f7df8955d12282b9a.dll
-
Size
5KB
-
MD5
c7a48de8b7b9e570a80a94002b5f96e0
-
SHA1
8250fe125c0c2b7599b788b7ce043f6814522e73
-
SHA256
60da17cf01d0681c19d4c2ac0cf45aea84866834c811b68f7df8955d12282b9a
-
SHA512
a3d8b42a029e7882ed78da3aa75495cb775c68ce1b33cc2a067605e4cfa180d8226040b6a7fdeddf0c806526e952aca528c0bf31744a6784f40dfe7e750c8fee
-
SSDEEP
96:XprYDpKnI6wJ+Ls7guyHejyn/I9l0iaiGlN:XUcA+ggd+W/If0iI
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4288 wrote to memory of 2508 4288 rundll32.exe 81 PID 4288 wrote to memory of 2508 4288 rundll32.exe 81 PID 4288 wrote to memory of 2508 4288 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60da17cf01d0681c19d4c2ac0cf45aea84866834c811b68f7df8955d12282b9a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60da17cf01d0681c19d4c2ac0cf45aea84866834c811b68f7df8955d12282b9a.dll,#12⤵PID:2508
-