Analysis
-
max time kernel
91s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 11:56
Behavioral task
behavioral1
Sample
c6878f40ed052d5ccd88692fe2c31a1c0cca5ed0a96f4e8e7ed0fc24ae8594a0.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c6878f40ed052d5ccd88692fe2c31a1c0cca5ed0a96f4e8e7ed0fc24ae8594a0.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c6878f40ed052d5ccd88692fe2c31a1c0cca5ed0a96f4e8e7ed0fc24ae8594a0.dll
-
Size
140KB
-
MD5
8fedbe7699821f8deb90edfd183f43ed
-
SHA1
8d16c9a76e99ee0eeb11b72dda0fc0d98a89b7f1
-
SHA256
c6878f40ed052d5ccd88692fe2c31a1c0cca5ed0a96f4e8e7ed0fc24ae8594a0
-
SHA512
a49d6e3042561bab7b592828f46438e1b06b82ecca7e3feb5a078eb5b070533b16e4c54c5d3d8c1a406ff943c99578696e5bf7a660ce7519789d84c020d030fd
-
SSDEEP
3072:wp8UaFPmgRMNlPTGQQm6ytwZEsrYkK4m:wa98gWNlPTGQQm6agrdm
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4204 wrote to memory of 2264 4204 rundll32.exe 48 PID 4204 wrote to memory of 2264 4204 rundll32.exe 48 PID 4204 wrote to memory of 2264 4204 rundll32.exe 48
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6878f40ed052d5ccd88692fe2c31a1c0cca5ed0a96f4e8e7ed0fc24ae8594a0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6878f40ed052d5ccd88692fe2c31a1c0cca5ed0a96f4e8e7ed0fc24ae8594a0.dll,#12⤵PID:2264
-