Analysis
-
max time kernel
92s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 01:23
Static task
static1
Behavioral task
behavioral1
Sample
bc1acc0cd998e6b671c54fdc2e42a9751929fd75d7a4c6989e9a05ac3e5a9b02.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
bc1acc0cd998e6b671c54fdc2e42a9751929fd75d7a4c6989e9a05ac3e5a9b02.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
bc1acc0cd998e6b671c54fdc2e42a9751929fd75d7a4c6989e9a05ac3e5a9b02.dll
-
Size
3KB
-
MD5
8e3f0f1fe6a98c649a84e8a1742f3650
-
SHA1
acb67517a5677ccb358043b58282613f8020e5b7
-
SHA256
bc1acc0cd998e6b671c54fdc2e42a9751929fd75d7a4c6989e9a05ac3e5a9b02
-
SHA512
e2c6ae2d9540213f4ae17bdb17d0117ff67abc682aff99588ba6e4a5b0290eca64f665438914d55a7bb32cafc41eb1aa9b2c4aeecda0e9b84cd0dc33a90d87a3
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 1060 4772 rundll32.exe 41 PID 4772 wrote to memory of 1060 4772 rundll32.exe 41 PID 4772 wrote to memory of 1060 4772 rundll32.exe 41
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc1acc0cd998e6b671c54fdc2e42a9751929fd75d7a4c6989e9a05ac3e5a9b02.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc1acc0cd998e6b671c54fdc2e42a9751929fd75d7a4c6989e9a05ac3e5a9b02.dll,#12⤵PID:1060
-