Analysis
-
max time kernel
166s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 23:35
Static task
static1
Behavioral task
behavioral1
Sample
aace02de60babba0c81f634dcbb5e45e7b6170ec69c154398cd597c20963b831.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
aace02de60babba0c81f634dcbb5e45e7b6170ec69c154398cd597c20963b831.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
aace02de60babba0c81f634dcbb5e45e7b6170ec69c154398cd597c20963b831.dll
-
Size
3KB
-
MD5
93ee10381065b527e3041ac5b81eda40
-
SHA1
c1ba3e0bd1114f11a8b7865364fd735c0ecea620
-
SHA256
aace02de60babba0c81f634dcbb5e45e7b6170ec69c154398cd597c20963b831
-
SHA512
86f6b19389e8a4a7c2aab9c1008ba128e09e4d0ba153436560d36f334958ea9afed8df392f8dfb4b473909d4e9cd57c902bfbc804aad6e810b50386c6fdac971
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4844 wrote to memory of 5088 4844 rundll32.exe 83 PID 4844 wrote to memory of 5088 4844 rundll32.exe 83 PID 4844 wrote to memory of 5088 4844 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aace02de60babba0c81f634dcbb5e45e7b6170ec69c154398cd597c20963b831.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aace02de60babba0c81f634dcbb5e45e7b6170ec69c154398cd597c20963b831.dll,#12⤵PID:5088
-