Analysis
-
max time kernel
163s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 03:07
Behavioral task
behavioral1
Sample
c697bb94bcf815c76f94ef65885f720ea12452361aabf237bf5f687d05afd8a8.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c697bb94bcf815c76f94ef65885f720ea12452361aabf237bf5f687d05afd8a8.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
c697bb94bcf815c76f94ef65885f720ea12452361aabf237bf5f687d05afd8a8.dll
-
Size
51KB
-
MD5
5c69146cad338e776c82db41c3b17e51
-
SHA1
04624e8e590d474cf6e620e9560081b45ba6e509
-
SHA256
c697bb94bcf815c76f94ef65885f720ea12452361aabf237bf5f687d05afd8a8
-
SHA512
669894334d27c167ee1e853c664443665a64946b04b128b1ae1469eedb63b90833338eb8bdcb278b6b344db25866ae5b85ec2c214085204790ea0369000117bb
-
SSDEEP
1536:n7ZLNPp9pZBMr30aWZzblbiY//3HwPAxhbpnz194b:7Zppw2Bb9iyHwPMnH4b
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2252 1720 rundll32.exe 81 PID 1720 wrote to memory of 2252 1720 rundll32.exe 81 PID 1720 wrote to memory of 2252 1720 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c697bb94bcf815c76f94ef65885f720ea12452361aabf237bf5f687d05afd8a8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c697bb94bcf815c76f94ef65885f720ea12452361aabf237bf5f687d05afd8a8.dll,#12⤵PID:2252
-