Analysis
-
max time kernel
112s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 07:05
Behavioral task
behavioral1
Sample
805d660fffd3ce04a55087f22c5899c5d35cd550808a5180577b3b12992aef43.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
805d660fffd3ce04a55087f22c5899c5d35cd550808a5180577b3b12992aef43.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
805d660fffd3ce04a55087f22c5899c5d35cd550808a5180577b3b12992aef43.dll
-
Size
98KB
-
MD5
700aab9257f892f971a403e1b834e64c
-
SHA1
b2c2781452a680a720890f3c5e3141918249c837
-
SHA256
805d660fffd3ce04a55087f22c5899c5d35cd550808a5180577b3b12992aef43
-
SHA512
16db8199892021104de00dc55ec780a46e8b07ca5e0edb2da7093fc7e126d0ebb0702a34d5c9ec6f78a4929d2a17f2095925c5139ddc0ebbe5df45f7e2499f28
-
SSDEEP
3072:qErDP/wWwXjcFhJwlHcFs0+Tw3rkOZ1UE:VrL/woFoHcraw3YOZm
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 3256 4440 rundll32.exe 78 PID 4440 wrote to memory of 3256 4440 rundll32.exe 78 PID 4440 wrote to memory of 3256 4440 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\805d660fffd3ce04a55087f22c5899c5d35cd550808a5180577b3b12992aef43.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\805d660fffd3ce04a55087f22c5899c5d35cd550808a5180577b3b12992aef43.dll,#12⤵PID:3256
-