Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 03:43
Behavioral task
behavioral1
Sample
97e892ae3297b7ec93cdf95c3dd08eaead81ca35e2153e9c04f49139418e9f3a.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
97e892ae3297b7ec93cdf95c3dd08eaead81ca35e2153e9c04f49139418e9f3a.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
97e892ae3297b7ec93cdf95c3dd08eaead81ca35e2153e9c04f49139418e9f3a.dll
-
Size
62KB
-
MD5
fc43cb538c3077d069ecb0137a39c5d4
-
SHA1
79e8feb7b162c76fb01cc6eebcf01339a56e6a56
-
SHA256
97e892ae3297b7ec93cdf95c3dd08eaead81ca35e2153e9c04f49139418e9f3a
-
SHA512
b2a8c2fd370bf953ecdeb728d39326ebe82e24beccd989d9cdc410d18587b0e658cd1a321911c71671b47a4a793321bc16459692c839b16ffe927c1c89f19089
-
SSDEEP
1536:2hq93iO/Hx3/8A50eNTJD9n3ixKIVs3cUqTSzK:zr53j0k5nbI02Sm
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4152 4344 rundll32.exe 80 PID 4344 wrote to memory of 4152 4344 rundll32.exe 80 PID 4344 wrote to memory of 4152 4344 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\97e892ae3297b7ec93cdf95c3dd08eaead81ca35e2153e9c04f49139418e9f3a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\97e892ae3297b7ec93cdf95c3dd08eaead81ca35e2153e9c04f49139418e9f3a.dll,#12⤵PID:4152
-