Analysis
-
max time kernel
144s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 09:19
Static task
static1
Behavioral task
behavioral1
Sample
91c17a0ba74654bed8a6ab027456fc83f8bc84f8284c3504e4e12f99569f8c83.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
91c17a0ba74654bed8a6ab027456fc83f8bc84f8284c3504e4e12f99569f8c83.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
91c17a0ba74654bed8a6ab027456fc83f8bc84f8284c3504e4e12f99569f8c83.dll
-
Size
3KB
-
MD5
bdf777aa938c379e7a235c26c8182ba0
-
SHA1
ccaad2a05829dfa94ec47891ef0b04a6d336d468
-
SHA256
91c17a0ba74654bed8a6ab027456fc83f8bc84f8284c3504e4e12f99569f8c83
-
SHA512
0c0ab6b2713e11fc3389061c7adf944f0fc0b8396048aed055adc293dc366778d47af73a39af2a9e04db21eb9a0de72b56be10acaa8b48d67e47dccb24df99f4
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4548 wrote to memory of 3096 4548 rundll32.exe 79 PID 4548 wrote to memory of 3096 4548 rundll32.exe 79 PID 4548 wrote to memory of 3096 4548 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\91c17a0ba74654bed8a6ab027456fc83f8bc84f8284c3504e4e12f99569f8c83.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\91c17a0ba74654bed8a6ab027456fc83f8bc84f8284c3504e4e12f99569f8c83.dll,#12⤵PID:3096
-