Analysis
-
max time kernel
146s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 08:30
Behavioral task
behavioral1
Sample
62f625809611b04354faca17b31a740618dcd251795051a2550649c97dd326bb.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
62f625809611b04354faca17b31a740618dcd251795051a2550649c97dd326bb.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
62f625809611b04354faca17b31a740618dcd251795051a2550649c97dd326bb.dll
-
Size
72KB
-
MD5
ee510c7d9da2822719fb1b1b55c55740
-
SHA1
a1908688afa3c836c9cf8c554d9968ec63c852fc
-
SHA256
62f625809611b04354faca17b31a740618dcd251795051a2550649c97dd326bb
-
SHA512
d1a6f3c5669e055f4710535f0fec4a26123aa9aaad1a6b570a907044f9ca0b97ff252ec6ddd4e78d1f2ae2f35743afebf7171a6abd0904dd22649f34f35b230e
-
SSDEEP
1536:MhBRVgrExucMHtY/xXLdrqXE+2fcTY1r6CH3/42z/vAQ1/6DvCNnY4:cRRsg/xwXj2fcTMrTP42joLTCNnd
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2332-133-0x0000000010000000-0x0000000010017000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2332 1888 rundll32.exe 81 PID 1888 wrote to memory of 2332 1888 rundll32.exe 81 PID 1888 wrote to memory of 2332 1888 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62f625809611b04354faca17b31a740618dcd251795051a2550649c97dd326bb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62f625809611b04354faca17b31a740618dcd251795051a2550649c97dd326bb.dll,#12⤵PID:2332
-