Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 03:32
Behavioral task
behavioral1
Sample
84ad8a6a29174a31032bcefce5b7f5864fcfeadcc6229a5a3a69d193c2a51fb1.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
84ad8a6a29174a31032bcefce5b7f5864fcfeadcc6229a5a3a69d193c2a51fb1.dll
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
84ad8a6a29174a31032bcefce5b7f5864fcfeadcc6229a5a3a69d193c2a51fb1.dll
-
Size
63KB
-
MD5
63604ab95e14a75dbd9fbda4b619a8b7
-
SHA1
a4fcbb4524e7b682069bdcdf5a490b1090a40492
-
SHA256
84ad8a6a29174a31032bcefce5b7f5864fcfeadcc6229a5a3a69d193c2a51fb1
-
SHA512
cd9eb89d07422b505a7c8c52a788e09301b396fe68c3d4e1ea5da5c6f737d48ba71f3dd5954299abcfdae5aff645273551c63c93a601779454abc8c39fc5ab6b
-
SSDEEP
1536:V8O9Nn6RjriGfcsPj5kHbWGzGmyRRDEs2SyTaQbiXxzm07+Guu3:2Oz6VW69Pj5k7vGmqqaQmXxKAuu3
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4796 4880 rundll32.exe 80 PID 4880 wrote to memory of 4796 4880 rundll32.exe 80 PID 4880 wrote to memory of 4796 4880 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84ad8a6a29174a31032bcefce5b7f5864fcfeadcc6229a5a3a69d193c2a51fb1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84ad8a6a29174a31032bcefce5b7f5864fcfeadcc6229a5a3a69d193c2a51fb1.dll,#12⤵PID:4796
-