Analysis
-
max time kernel
164s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 19:41
Behavioral task
behavioral1
Sample
a37f7508fc6aaddfa08485b026642f87d2b50db73d59666092124d3293c809c2.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a37f7508fc6aaddfa08485b026642f87d2b50db73d59666092124d3293c809c2.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
a37f7508fc6aaddfa08485b026642f87d2b50db73d59666092124d3293c809c2.dll
-
Size
73KB
-
MD5
84750159c902e8495b48e37ac375b770
-
SHA1
e8d60065889f6a430e717cde6df1493f3b1a9136
-
SHA256
a37f7508fc6aaddfa08485b026642f87d2b50db73d59666092124d3293c809c2
-
SHA512
61fa40f046ad602026dcdb932cc45eaa564246d6cdce09dc3a11785facc680ab6c9b7794751969a80eab443217e2c02d8b36cd1825f3867720be43b2dda5c39f
-
SSDEEP
1536:VZIcCxR+PM6JBNtp0aKyZYmVTYzHSwfGm8wlRF68ki2ofDbbaNu86WD:r+AthNbYCTYzjfGm8O36i6tD
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4156 4112 rundll32.exe 83 PID 4112 wrote to memory of 4156 4112 rundll32.exe 83 PID 4112 wrote to memory of 4156 4112 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a37f7508fc6aaddfa08485b026642f87d2b50db73d59666092124d3293c809c2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a37f7508fc6aaddfa08485b026642f87d2b50db73d59666092124d3293c809c2.dll,#12⤵PID:4156
-