Analysis
-
max time kernel
153s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 15:23
Behavioral task
behavioral1
Sample
ae70d3977424dd36670159f8d0198a4decc7a191e4f397089455536e4cc627b8.dll
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ae70d3977424dd36670159f8d0198a4decc7a191e4f397089455536e4cc627b8.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
ae70d3977424dd36670159f8d0198a4decc7a191e4f397089455536e4cc627b8.dll
-
Size
66KB
-
MD5
65ea137a1d2303619900d8d5b5ddcbb1
-
SHA1
3caa032b2c185ff4cdd3cca1c3fafd7dc5ae435b
-
SHA256
ae70d3977424dd36670159f8d0198a4decc7a191e4f397089455536e4cc627b8
-
SHA512
c7facd4d959410d98c6c1d88bb37b5ef99bf762f7598ea0b8387ec637119e2636682eac01f587b15f31f48741246a3d3e5facd0a6ebacc17514c3e7597fe6230
-
SSDEEP
1536:OBRVgrExucMiBQkXL3b/swAKGqIV0N0zdwcwCFliG3GWREQ:ERRsALL/swA1TqN0BzuG2WREQ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4640 4716 rundll32.exe 83 PID 4716 wrote to memory of 4640 4716 rundll32.exe 83 PID 4716 wrote to memory of 4640 4716 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae70d3977424dd36670159f8d0198a4decc7a191e4f397089455536e4cc627b8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae70d3977424dd36670159f8d0198a4decc7a191e4f397089455536e4cc627b8.dll,#12⤵PID:4640
-