Analysis
-
max time kernel
149s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
1f2b986a6d1c85ff084e0346b82cac7377f526f7c2a750b3f1b23beebc225510.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1f2b986a6d1c85ff084e0346b82cac7377f526f7c2a750b3f1b23beebc225510.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
1f2b986a6d1c85ff084e0346b82cac7377f526f7c2a750b3f1b23beebc225510.dll
-
Size
80KB
-
MD5
0f18e57d79943f2db638a5e04d882fff
-
SHA1
61f4ab6f00b7ad1258811cf2a04fb9f8ccf769ec
-
SHA256
1f2b986a6d1c85ff084e0346b82cac7377f526f7c2a750b3f1b23beebc225510
-
SHA512
a1bb74b90d8f8302e30c6c244f1c30ff0d4224b7910dfda62b6ef0528b78bc9a00b4092d849983321d9a9be9a85cc9887ff335ed7987e01ff834416c6b6e2547
-
SSDEEP
1536:19jul/CI81XRnxRMTtnDoVgUkK0YfyUo6:19j6/J83xo64KL1o6
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3776 wrote to memory of 1320 3776 rundll32.exe 81 PID 3776 wrote to memory of 1320 3776 rundll32.exe 81 PID 3776 wrote to memory of 1320 3776 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f2b986a6d1c85ff084e0346b82cac7377f526f7c2a750b3f1b23beebc225510.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f2b986a6d1c85ff084e0346b82cac7377f526f7c2a750b3f1b23beebc225510.dll,#12⤵PID:1320
-