Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 19:37
Behavioral task
behavioral1
Sample
a83610c525ed76ae0a0ca40cc25a7564b7a493614f12e0fb78641cc1de569597.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a83610c525ed76ae0a0ca40cc25a7564b7a493614f12e0fb78641cc1de569597.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
a83610c525ed76ae0a0ca40cc25a7564b7a493614f12e0fb78641cc1de569597.dll
-
Size
71KB
-
MD5
c591cd8e81f2ccf03ad88d0960b58950
-
SHA1
4699c87e7f06ef265ecae9bf72605b479c09c898
-
SHA256
a83610c525ed76ae0a0ca40cc25a7564b7a493614f12e0fb78641cc1de569597
-
SHA512
91b7bf291ddcd3fe02b35acbf639d24b08d87bc22bc96630b6e29073e139896d99d24acb6bed6c3b9f67e3d93cf331d536dbc81f0f1d28f77210b160ad78b5b2
-
SSDEEP
1536:RVfCAK3dZsjWutiOa20MyOBMLs9Au9zMQjN:TfmutiOa29yOBA+9N
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2264 wrote to memory of 4948 2264 rundll32.exe 80 PID 2264 wrote to memory of 4948 2264 rundll32.exe 80 PID 2264 wrote to memory of 4948 2264 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a83610c525ed76ae0a0ca40cc25a7564b7a493614f12e0fb78641cc1de569597.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a83610c525ed76ae0a0ca40cc25a7564b7a493614f12e0fb78641cc1de569597.dll,#12⤵PID:4948
-