Analysis
-
max time kernel
168s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 21:36
Behavioral task
behavioral1
Sample
b73267b58a5e778a0e5b54785af5ac633e6966a83cbcb48705bab42156951872.dll
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b73267b58a5e778a0e5b54785af5ac633e6966a83cbcb48705bab42156951872.dll
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
b73267b58a5e778a0e5b54785af5ac633e6966a83cbcb48705bab42156951872.dll
-
Size
327KB
-
MD5
3abadeec500da846bcf4c9564fbf5e00
-
SHA1
f74b20ecf357c355b85f22ac865aa4a76f1533cb
-
SHA256
b73267b58a5e778a0e5b54785af5ac633e6966a83cbcb48705bab42156951872
-
SHA512
a0cce233cb29197118168f67e69316b8306264454a51ae003fca1797b0e398693a47ba48974848ac928b32d3bbb5b2de9ea7f2b4e8861b4d431be324c7127aa5
-
SSDEEP
3072:+4XA3u+0uwCgiWLdiSh8SH62v5U2gQceEp:+4Xe4ibYdr2d2vCOe
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/836-133-0x0000000010000000-0x0000000010054000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 836 1680 rundll32.exe 79 PID 1680 wrote to memory of 836 1680 rundll32.exe 79 PID 1680 wrote to memory of 836 1680 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b73267b58a5e778a0e5b54785af5ac633e6966a83cbcb48705bab42156951872.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b73267b58a5e778a0e5b54785af5ac633e6966a83cbcb48705bab42156951872.dll,#12⤵PID:836
-