Analysis
-
max time kernel
137s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 19:16
Behavioral task
behavioral1
Sample
509f24b7a64df9b44dcf7532465ee71b23a6bc525c8d4293c3525647aee148a5.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
509f24b7a64df9b44dcf7532465ee71b23a6bc525c8d4293c3525647aee148a5.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
509f24b7a64df9b44dcf7532465ee71b23a6bc525c8d4293c3525647aee148a5.dll
-
Size
73KB
-
MD5
6d680cc8a0f79b52ae06f0ee00186010
-
SHA1
c7c8f2c416e7630cd1133455bcca166686dd9823
-
SHA256
509f24b7a64df9b44dcf7532465ee71b23a6bc525c8d4293c3525647aee148a5
-
SHA512
dd5726fc9e0189a94ff305b972f84ea1fd7b5154cffdd06f9f4083bd7f551723aebf1b7918601a8a12250195c513fc5b4e5830ae446cd9912b9af86de769ee58
-
SSDEEP
1536:5jRmO9gQjVAhrGwUxY28WDhm6MY8HUNGSyRUrB/LUjZjURV9+:xf9TjVUCDhm6MYMUNGSyRMz3R2
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 1312 4888 rundll32.exe 80 PID 4888 wrote to memory of 1312 4888 rundll32.exe 80 PID 4888 wrote to memory of 1312 4888 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\509f24b7a64df9b44dcf7532465ee71b23a6bc525c8d4293c3525647aee148a5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\509f24b7a64df9b44dcf7532465ee71b23a6bc525c8d4293c3525647aee148a5.dll,#12⤵PID:1312
-