Analysis
-
max time kernel
112s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
a5694bffed52ccca7af07a02b7101cc65de6058849617fc23afc6a811591f93f.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a5694bffed52ccca7af07a02b7101cc65de6058849617fc23afc6a811591f93f.dll
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
a5694bffed52ccca7af07a02b7101cc65de6058849617fc23afc6a811591f93f.dll
-
Size
4KB
-
MD5
0ea98e15d0b6af6493ff386b59471f10
-
SHA1
5b669b5330e4c0d7af7e84e50c4b5b200ce46367
-
SHA256
a5694bffed52ccca7af07a02b7101cc65de6058849617fc23afc6a811591f93f
-
SHA512
67fb2bbf8fe5b777862bea78aa0e4b646dc30dbd41c30a6ac572fd4fb5f8c63066b004ae6607f3df25a3e795de7c5db243fd14f6c77522cfa63f103394a4ff10
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 2168 4960 rundll32.exe 81 PID 4960 wrote to memory of 2168 4960 rundll32.exe 81 PID 4960 wrote to memory of 2168 4960 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5694bffed52ccca7af07a02b7101cc65de6058849617fc23afc6a811591f93f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5694bffed52ccca7af07a02b7101cc65de6058849617fc23afc6a811591f93f.dll,#12⤵PID:2168
-