Analysis
-
max time kernel
156s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
7e335fbde8d93e0b38da8da3fe0a5aa686abb534f1ac8c087395cc3dff517e42.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7e335fbde8d93e0b38da8da3fe0a5aa686abb534f1ac8c087395cc3dff517e42.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
7e335fbde8d93e0b38da8da3fe0a5aa686abb534f1ac8c087395cc3dff517e42.dll
-
Size
6KB
-
MD5
7526958e5c971d7daa455d56d4c64080
-
SHA1
2ea495df6fa5181df2ac555500e0b706b7030e0d
-
SHA256
7e335fbde8d93e0b38da8da3fe0a5aa686abb534f1ac8c087395cc3dff517e42
-
SHA512
f4b778354d3d28f429ea31469efde5002c8943cb22bc5fa18dd853f15dcc9e5100ce72d2d750c2fde178a972d480a3e99b4a71f281c095b3bc12e1cda1ab0a0c
-
SSDEEP
96:hyZxm/jmjhjvj3jcZGV42zndndXIL0IFFu/:2M/SdjbgYLVdXw0Su
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2440 1848 rundll32.exe 76 PID 1848 wrote to memory of 2440 1848 rundll32.exe 76 PID 1848 wrote to memory of 2440 1848 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e335fbde8d93e0b38da8da3fe0a5aa686abb534f1ac8c087395cc3dff517e42.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e335fbde8d93e0b38da8da3fe0a5aa686abb534f1ac8c087395cc3dff517e42.dll,#12⤵PID:2440
-