Analysis
-
max time kernel
159s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 11:36
Static task
static1
Behavioral task
behavioral1
Sample
2ce6d524ee9b0be5c7ef58855aefb0dd17f6fce400380c6220afda96186f3569.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ce6d524ee9b0be5c7ef58855aefb0dd17f6fce400380c6220afda96186f3569.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
2ce6d524ee9b0be5c7ef58855aefb0dd17f6fce400380c6220afda96186f3569.dll
-
Size
4KB
-
MD5
33bb15a08242ab223ea79f6002cf00b0
-
SHA1
8a64edf93b00d15bcca3f9b1f47d1e411812e2f6
-
SHA256
2ce6d524ee9b0be5c7ef58855aefb0dd17f6fce400380c6220afda96186f3569
-
SHA512
7ddefce5a0bac25b67c5a711f17c19aa71d37862bdc00697cfe7ca40fecf0b5c6bf9549efe141883a93c548f8c3b213731b0ce135211411e9290b5ab94dc91da
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3444 wrote to memory of 4804 3444 rundll32.exe 80 PID 3444 wrote to memory of 4804 3444 rundll32.exe 80 PID 3444 wrote to memory of 4804 3444 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ce6d524ee9b0be5c7ef58855aefb0dd17f6fce400380c6220afda96186f3569.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ce6d524ee9b0be5c7ef58855aefb0dd17f6fce400380c6220afda96186f3569.dll,#12⤵PID:4804
-