Analysis
-
max time kernel
181s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
79f2ab4477384b12ad6c3cb4624fc4ad1e3493c6c81b97f143a5c9afaa8fb943.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
79f2ab4477384b12ad6c3cb4624fc4ad1e3493c6c81b97f143a5c9afaa8fb943.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
79f2ab4477384b12ad6c3cb4624fc4ad1e3493c6c81b97f143a5c9afaa8fb943.dll
-
Size
33KB
-
MD5
f047135a5f0dac84955b0ee8d3d605a0
-
SHA1
4e9a356275093939aabfc91a0c45b1a0122d9843
-
SHA256
79f2ab4477384b12ad6c3cb4624fc4ad1e3493c6c81b97f143a5c9afaa8fb943
-
SHA512
bd792a2066dead39f05e55ac7c43d283e38a56bbf817e24d7a68ffe286d9f37eb7b93cff675192b5c66bc573b4b27817579e80d41354bb2f4e13d560b8f87ad4
-
SSDEEP
768:c9qeula2iuu4enYOE7IOIoSYhqD6RBu6J:c9qeulu4eYj7IOI2kGRB7J
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4688 wrote to memory of 4752 4688 rundll32.exe 79 PID 4688 wrote to memory of 4752 4688 rundll32.exe 79 PID 4688 wrote to memory of 4752 4688 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\79f2ab4477384b12ad6c3cb4624fc4ad1e3493c6c81b97f143a5c9afaa8fb943.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\79f2ab4477384b12ad6c3cb4624fc4ad1e3493c6c81b97f143a5c9afaa8fb943.dll,#12⤵PID:4752
-