Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 01:21
Behavioral task
behavioral1
Sample
ba270f2167d4a4d5c1f5df742b82b4c097ce633d41dbfafbd5bbc90398f66f97.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ba270f2167d4a4d5c1f5df742b82b4c097ce633d41dbfafbd5bbc90398f66f97.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
ba270f2167d4a4d5c1f5df742b82b4c097ce633d41dbfafbd5bbc90398f66f97.dll
-
Size
68KB
-
MD5
f43fbe2fe8a7dc70f48c2cb2e708c311
-
SHA1
184fc421216b165f741efc1af0914e894285bf28
-
SHA256
ba270f2167d4a4d5c1f5df742b82b4c097ce633d41dbfafbd5bbc90398f66f97
-
SHA512
a5a42ab15197a9bc09da40a6a31ef1af85ae648fc1eaabe654544b70cdf11ad8bdd60c20753c555dcba5fd2a33864a41fc61770d0158011a7a1601b84412dff4
-
SSDEEP
1536:e6PViKQXhEh8teeZk4/FrirQb1zg3desyNCNhbq3:RViKYEateem25pg3N6CC3
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4884 wrote to memory of 364 4884 rundll32.exe 80 PID 4884 wrote to memory of 364 4884 rundll32.exe 80 PID 4884 wrote to memory of 364 4884 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ba270f2167d4a4d5c1f5df742b82b4c097ce633d41dbfafbd5bbc90398f66f97.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ba270f2167d4a4d5c1f5df742b82b4c097ce633d41dbfafbd5bbc90398f66f97.dll,#12⤵PID:364
-