Analysis
-
max time kernel
151s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 22:02
Static task
static1
Behavioral task
behavioral1
Sample
617a417bd362760b06a06e29a2403346d7f5e9face8f7b4cc6ffba0f5a0a6738.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
617a417bd362760b06a06e29a2403346d7f5e9face8f7b4cc6ffba0f5a0a6738.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
617a417bd362760b06a06e29a2403346d7f5e9face8f7b4cc6ffba0f5a0a6738.dll
-
Size
28KB
-
MD5
a8c2bf8ced3d9eeefb37fc5efcdea3c0
-
SHA1
57928461dca5c34d0264940285e0c36b90ca9d71
-
SHA256
617a417bd362760b06a06e29a2403346d7f5e9face8f7b4cc6ffba0f5a0a6738
-
SHA512
98735234a6f5c9528eb5c727198c28ea9fba13b082e119b62a935540b1734d8d9d8f8f7bcce40322e73299ef30a71ed2e19881d6620fdb2f7a880027cdf47826
-
SSDEEP
384:ZiW2/S8CHPw7Im5ajszMY/7mjA3/OpUP/lfe:Jb8IO/u6/O+P
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3364 wrote to memory of 3460 3364 rundll32.exe 82 PID 3364 wrote to memory of 3460 3364 rundll32.exe 82 PID 3364 wrote to memory of 3460 3364 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\617a417bd362760b06a06e29a2403346d7f5e9face8f7b4cc6ffba0f5a0a6738.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\617a417bd362760b06a06e29a2403346d7f5e9face8f7b4cc6ffba0f5a0a6738.dll,#12⤵PID:3460
-