Analysis
-
max time kernel
170s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 21:43
Static task
static1
Behavioral task
behavioral1
Sample
fe17e86f64030c0574e5e18a28e5d3b603cf803f55382761fb5c726004d451c8.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
fe17e86f64030c0574e5e18a28e5d3b603cf803f55382761fb5c726004d451c8.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
fe17e86f64030c0574e5e18a28e5d3b603cf803f55382761fb5c726004d451c8.dll
-
Size
6KB
-
MD5
1ab9867f8e21443304bf122bb60aaf40
-
SHA1
737fc681ab904c8f9c20bf06a4bcb4afd6f2d5c9
-
SHA256
fe17e86f64030c0574e5e18a28e5d3b603cf803f55382761fb5c726004d451c8
-
SHA512
92044e4ad7b8fb7414509b407a36155fda7544a82aa327be36f74e125eef56d214a53f7181ae84192b0e002f6e5e9af63e3a436558940f86dab25c73b6466737
-
SSDEEP
96:nEY2RrF1eqwi482t6N5Ikj7/0ZGdw9lpOYSLaPT:EHRh1eppSo9lpO
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3416 wrote to memory of 2020 3416 rundll32.exe 82 PID 3416 wrote to memory of 2020 3416 rundll32.exe 82 PID 3416 wrote to memory of 2020 3416 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe17e86f64030c0574e5e18a28e5d3b603cf803f55382761fb5c726004d451c8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe17e86f64030c0574e5e18a28e5d3b603cf803f55382761fb5c726004d451c8.dll,#12⤵PID:2020
-