Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 11:33
Static task
static1
Behavioral task
behavioral1
Sample
4f58e0943944656f83bc14c802e550406b9b073044dc7e433219b925a8bab8ea.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f58e0943944656f83bc14c802e550406b9b073044dc7e433219b925a8bab8ea.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
4f58e0943944656f83bc14c802e550406b9b073044dc7e433219b925a8bab8ea.dll
-
Size
6KB
-
MD5
e8dc49e972ba014c3a43eeeb10880030
-
SHA1
e21bbf62bfbddc0049f289991dc367ef2a698306
-
SHA256
4f58e0943944656f83bc14c802e550406b9b073044dc7e433219b925a8bab8ea
-
SHA512
eba6145adfd59009e36ec68cb8d61389f998fb7e206f4c121d9128197cad7d82776ef96d2241dd3b3b60090efed4175a174bb9d79edcda8eeecf7558a7f2d45f
-
SSDEEP
96:hy859x0P8MaMNxPP6F5+jjiqN4MUdDuNPYrbb:F5oLX2FkRNYrH
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4896 wrote to memory of 2452 4896 rundll32.exe 80 PID 4896 wrote to memory of 2452 4896 rundll32.exe 80 PID 4896 wrote to memory of 2452 4896 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f58e0943944656f83bc14c802e550406b9b073044dc7e433219b925a8bab8ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f58e0943944656f83bc14c802e550406b9b073044dc7e433219b925a8bab8ea.dll,#12⤵PID:2452
-