Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
d8655ae9d44a00e8976542f2cd2b650bfd96b0c0cdb4a88915c0917d2c5d6878.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d8655ae9d44a00e8976542f2cd2b650bfd96b0c0cdb4a88915c0917d2c5d6878.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
d8655ae9d44a00e8976542f2cd2b650bfd96b0c0cdb4a88915c0917d2c5d6878.dll
-
Size
224KB
-
MD5
ddea15a3e5926ee0e0e40ead70084062
-
SHA1
6c3e110c2e3b5f85ebd9bf8023fb05e74add2bbf
-
SHA256
d8655ae9d44a00e8976542f2cd2b650bfd96b0c0cdb4a88915c0917d2c5d6878
-
SHA512
e58c5636ec5454e90b040a0e7a21314a7e85e57eecd47a6df02d2eed1858afb3f0a783824bdb0becefb80da337481b0cec537acfb4244b063c0a15a3d71d657b
-
SSDEEP
6144:9OltpEFGiT24uzHLYp/i1CdyXGFj8VQO:9OQTLuzrYti1CQXcj8
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4648 wrote to memory of 3732 4648 rundll32.exe 79 PID 4648 wrote to memory of 3732 4648 rundll32.exe 79 PID 4648 wrote to memory of 3732 4648 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8655ae9d44a00e8976542f2cd2b650bfd96b0c0cdb4a88915c0917d2c5d6878.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8655ae9d44a00e8976542f2cd2b650bfd96b0c0cdb4a88915c0917d2c5d6878.dll,#12⤵PID:3732
-