Analysis
-
max time kernel
108s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 13:31
Static task
static1
Behavioral task
behavioral1
Sample
c96ab199cd8b150623f477fc3ea01531692990e71ad8525a394458bc930351bf.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c96ab199cd8b150623f477fc3ea01531692990e71ad8525a394458bc930351bf.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c96ab199cd8b150623f477fc3ea01531692990e71ad8525a394458bc930351bf.dll
-
Size
63KB
-
MD5
fbbbe48b35842b2405a2e1a64a6b5530
-
SHA1
4868159dfa17b1f560707158242fe831d03125e1
-
SHA256
c96ab199cd8b150623f477fc3ea01531692990e71ad8525a394458bc930351bf
-
SHA512
03572c9421bb83bb22a60b6b4404cedd7bc816575ea8c927e858866fc7970d8b4b22b1e342255a13cdac3072fa64e5f54716a0417d70f6b55e062c40f626be5a
-
SSDEEP
1536:mza5zlWwRQ/PmVocTLc9BNcoEXEx3IHz3l:mza5zlWw2P3zNcCIJ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 3052 4684 rundll32.exe 78 PID 4684 wrote to memory of 3052 4684 rundll32.exe 78 PID 4684 wrote to memory of 3052 4684 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c96ab199cd8b150623f477fc3ea01531692990e71ad8525a394458bc930351bf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c96ab199cd8b150623f477fc3ea01531692990e71ad8525a394458bc930351bf.dll,#12⤵PID:3052
-