Analysis
-
max time kernel
161s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
acd18dedddf8205a43539a4082e3290a17d025220b7f4d497345c1dae0a87bd9.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
acd18dedddf8205a43539a4082e3290a17d025220b7f4d497345c1dae0a87bd9.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
acd18dedddf8205a43539a4082e3290a17d025220b7f4d497345c1dae0a87bd9.dll
-
Size
260KB
-
MD5
3b6cb57414e80de63ebcafd941f313a1
-
SHA1
b88636079b0747b6bb81653e432a132e329e9fd6
-
SHA256
acd18dedddf8205a43539a4082e3290a17d025220b7f4d497345c1dae0a87bd9
-
SHA512
c238de8592881d79d690904c67a130f996a42bce64c98be9761240ea7f0f763af663f80b42f7d67be8c4c731c3fbb7cc02d9d9c09a4c7897c2d5177da4df3794
-
SSDEEP
6144:mFlYewiZXydOIpdPLnQJgHTgXfzwvSe85F2m1:sW4AdOsdPDQjXcej
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1780 wrote to memory of 4424 1780 rundll32.exe 81 PID 1780 wrote to memory of 4424 1780 rundll32.exe 81 PID 1780 wrote to memory of 4424 1780 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acd18dedddf8205a43539a4082e3290a17d025220b7f4d497345c1dae0a87bd9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acd18dedddf8205a43539a4082e3290a17d025220b7f4d497345c1dae0a87bd9.dll,#12⤵PID:4424
-