Analysis
-
max time kernel
164s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 01:58
Behavioral task
behavioral1
Sample
c0730d4bd3df09bd49ad346be6f87eb497fc97faa19be5b39aec61fb6d91f6d2.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c0730d4bd3df09bd49ad346be6f87eb497fc97faa19be5b39aec61fb6d91f6d2.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
c0730d4bd3df09bd49ad346be6f87eb497fc97faa19be5b39aec61fb6d91f6d2.dll
-
Size
4KB
-
MD5
b036c685d9be5031f75c6f27eb8b75f0
-
SHA1
5069c76c3f7232cb6641686f6a4259b5e243185c
-
SHA256
c0730d4bd3df09bd49ad346be6f87eb497fc97faa19be5b39aec61fb6d91f6d2
-
SHA512
f717e702924d4e0d5670c2177544718684d8f62985d49cbca743a7f3a1efdc3059e577514dafd62ece6c879efc8885ed0ca19b2c9d7b95b55384a64d3aa213a9
-
SSDEEP
48:a5zuMqBcq06phM/wwWLSeJY8JTa6Il+LCsX6LV81otBXOsq7L3SGyAipdOARwu:TRphMzf8CsXgG2/OsmSku
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4404 wrote to memory of 4392 4404 rundll32.exe 83 PID 4404 wrote to memory of 4392 4404 rundll32.exe 83 PID 4404 wrote to memory of 4392 4404 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0730d4bd3df09bd49ad346be6f87eb497fc97faa19be5b39aec61fb6d91f6d2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0730d4bd3df09bd49ad346be6f87eb497fc97faa19be5b39aec61fb6d91f6d2.dll,#12⤵PID:4392
-