Analysis
-
max time kernel
91s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 03:32
Behavioral task
behavioral1
Sample
6762e5ba40e0a51c80ac09238e52cfe0e42a1f11fd364d8a993c4da44b51bb1a.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
6762e5ba40e0a51c80ac09238e52cfe0e42a1f11fd364d8a993c4da44b51bb1a.dll
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
6762e5ba40e0a51c80ac09238e52cfe0e42a1f11fd364d8a993c4da44b51bb1a.dll
-
Size
45KB
-
MD5
c124156700762a4943b341d5fa8a2c37
-
SHA1
ca13c5603003f69e0bb411ec4b7e6b3f753aa52c
-
SHA256
6762e5ba40e0a51c80ac09238e52cfe0e42a1f11fd364d8a993c4da44b51bb1a
-
SHA512
522b82def2139fe5bc3cddaed68a10c15a6f09a6f0ea789cc730be1260def4144dbe512c632155dd1696d12aba4cfed12a883d89a6d08f3741c404ca0b157b1c
-
SSDEEP
768:V8Ohft9pnjz0bRjW49iqF0mL94X6js4utFsjDVWECehsfH4w7t1SSp9Lr3:V8O9Nn6RjriqOmPjs4wKjBWEY4wpTd3
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4640 wrote to memory of 360 4640 rundll32.exe 76 PID 4640 wrote to memory of 360 4640 rundll32.exe 76 PID 4640 wrote to memory of 360 4640 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6762e5ba40e0a51c80ac09238e52cfe0e42a1f11fd364d8a993c4da44b51bb1a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6762e5ba40e0a51c80ac09238e52cfe0e42a1f11fd364d8a993c4da44b51bb1a.dll,#12⤵PID:360
-