Analysis
-
max time kernel
148s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 17:56
Behavioral task
behavioral1
Sample
fd672e53eed3facb9e4d96c5c42be866b2ebba807a0bc500ee428242a63097a0.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
fd672e53eed3facb9e4d96c5c42be866b2ebba807a0bc500ee428242a63097a0.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
fd672e53eed3facb9e4d96c5c42be866b2ebba807a0bc500ee428242a63097a0.dll
-
Size
82KB
-
MD5
6519d8c354d81683b266091c31456680
-
SHA1
93ec1930e6b1f3460ccfb6787eb9cc5be0b9764b
-
SHA256
fd672e53eed3facb9e4d96c5c42be866b2ebba807a0bc500ee428242a63097a0
-
SHA512
6abef6b43e348e6440f2747fbfdeaea1438900acb425a7e31cddeed40a41cfb3c9bf2af23fed79ffa7a709af52556acefe96479970debe11d4155cef59aa9813
-
SSDEEP
1536:MMw3fJT3dhuAV8hgi3WwW0s43SMZE06Si1yn0XqgKIQcW7wU:MMGZdAg0B3rZE0lDIQ3
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5044-133-0x0000000075000000-0x0000000075024000-memory.dmp upx behavioral2/memory/5044-134-0x0000000075000000-0x0000000075024000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2856 wrote to memory of 5044 2856 rundll32.exe 82 PID 2856 wrote to memory of 5044 2856 rundll32.exe 82 PID 2856 wrote to memory of 5044 2856 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd672e53eed3facb9e4d96c5c42be866b2ebba807a0bc500ee428242a63097a0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd672e53eed3facb9e4d96c5c42be866b2ebba807a0bc500ee428242a63097a0.dll,#12⤵PID:5044
-