Analysis
-
max time kernel
256s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 23:20
Static task
static1
Behavioral task
behavioral1
Sample
10b1bcb9105dd237388176ff49d34983b66b8c8978bcfb18997f162ae20bb1fc.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
10b1bcb9105dd237388176ff49d34983b66b8c8978bcfb18997f162ae20bb1fc.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
10b1bcb9105dd237388176ff49d34983b66b8c8978bcfb18997f162ae20bb1fc.dll
-
Size
5KB
-
MD5
89a5e09a263ae18234427293cb6b8370
-
SHA1
6cac5fb0efb832181041c12669708f988199ce70
-
SHA256
10b1bcb9105dd237388176ff49d34983b66b8c8978bcfb18997f162ae20bb1fc
-
SHA512
214d234eb073eb41d02438b00e5bda590efc920aee0303f1951ce5fc24fe6a3c4fe2489ed728c3d5fe69f64cbcab9c337a6392be67de94d0393f2e99145193f5
-
SSDEEP
96:XprYDpKnI6wJ+Ls7guyHejyn/I9l0iaiBoSGhZ:XUcA+ggd+W/If0iboS6Z
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2696 3040 rundll32.exe 80 PID 3040 wrote to memory of 2696 3040 rundll32.exe 80 PID 3040 wrote to memory of 2696 3040 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10b1bcb9105dd237388176ff49d34983b66b8c8978bcfb18997f162ae20bb1fc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10b1bcb9105dd237388176ff49d34983b66b8c8978bcfb18997f162ae20bb1fc.dll,#12⤵PID:2696
-