Analysis
-
max time kernel
165s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 02:11
Behavioral task
behavioral1
Sample
85c3daa83add4f2d6075a80270a65653ab7d129581b143ecfcacabd7ad8fe0b4.dll
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
85c3daa83add4f2d6075a80270a65653ab7d129581b143ecfcacabd7ad8fe0b4.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
85c3daa83add4f2d6075a80270a65653ab7d129581b143ecfcacabd7ad8fe0b4.dll
-
Size
58KB
-
MD5
78425bef258e703135799d3347970c0b
-
SHA1
6719ef432ca63c05e07abdc46703c3350fee86ab
-
SHA256
85c3daa83add4f2d6075a80270a65653ab7d129581b143ecfcacabd7ad8fe0b4
-
SHA512
5956271581769a9b5230211895b92dc1df234692622caebb31e1df80a344ff1867483c15c8b489b4b1d0c59e3115ebff76ca438b086b408d7c84a10f25a49186
-
SSDEEP
1536:V2bl7KanN5YHUQOo/ff12E8/rarc625x/Hd5nfQkBr:Wl7VgHUQOo/noE8zuVeTPBr
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1788 1256 rundll32.exe 81 PID 1256 wrote to memory of 1788 1256 rundll32.exe 81 PID 1256 wrote to memory of 1788 1256 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85c3daa83add4f2d6075a80270a65653ab7d129581b143ecfcacabd7ad8fe0b4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85c3daa83add4f2d6075a80270a65653ab7d129581b143ecfcacabd7ad8fe0b4.dll,#12⤵PID:1788
-