Analysis
-
max time kernel
186s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 19:51
Behavioral task
behavioral1
Sample
fa0dcf173d9c6286fda1c14f543dfaba192c4d794675e2d15784fb85d1fb201d.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
fa0dcf173d9c6286fda1c14f543dfaba192c4d794675e2d15784fb85d1fb201d.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
fa0dcf173d9c6286fda1c14f543dfaba192c4d794675e2d15784fb85d1fb201d.dll
-
Size
51KB
-
MD5
f3d4237f41e1a24d1ec1bd0e6e659d30
-
SHA1
5b12d1641197c65a1fabb2c938c9f90b6e16617d
-
SHA256
fa0dcf173d9c6286fda1c14f543dfaba192c4d794675e2d15784fb85d1fb201d
-
SHA512
79b092d8497827fdc9db742ee208948cca064333970785815d3b0e6a15946b8e84bba7c3a1d6124f980b2118fd938eb1f0b85d62890c334e0190539d2f3da543
-
SSDEEP
768:kHwfLvO380astJMore8IowRBlo4Zus56yaLjmT/qWGN3u+cTqaUw9p:kQfr05tz6lw4Ms56yanmDqWM9w9p
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1500 1772 rundll32.exe 80 PID 1772 wrote to memory of 1500 1772 rundll32.exe 80 PID 1772 wrote to memory of 1500 1772 rundll32.exe 80
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa0dcf173d9c6286fda1c14f543dfaba192c4d794675e2d15784fb85d1fb201d.dll,#11⤵PID:1500
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa0dcf173d9c6286fda1c14f543dfaba192c4d794675e2d15784fb85d1fb201d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1772