Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 01:20
Behavioral task
behavioral1
Sample
c838631b8753a2b9b2da42107bf5aa019aaf61a498a71678eaedd5fd714eebb3.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c838631b8753a2b9b2da42107bf5aa019aaf61a498a71678eaedd5fd714eebb3.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c838631b8753a2b9b2da42107bf5aa019aaf61a498a71678eaedd5fd714eebb3.dll
-
Size
65KB
-
MD5
3caa5a1472e4640624b38b1ef3f8b3e9
-
SHA1
71b5c148ebc53fb6c44eca765da768025857ebfa
-
SHA256
c838631b8753a2b9b2da42107bf5aa019aaf61a498a71678eaedd5fd714eebb3
-
SHA512
9c696d5a57113b18da42bfd5ff409050f93af15e2f3319c6a99c83ec798258b0654b28ff27b9b01e0d9c97fa5983d628c7ea96f5629e82c814dd8cf72afd0f1b
-
SSDEEP
1536:mPO6KEVbsVP0gA22DJsAagopM1gm2BCdVRBSPLpZqfZ76:cMEVbsVcb2V6yAdbopcfB6
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4828 wrote to memory of 4032 4828 rundll32.exe 80 PID 4828 wrote to memory of 4032 4828 rundll32.exe 80 PID 4828 wrote to memory of 4032 4828 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c838631b8753a2b9b2da42107bf5aa019aaf61a498a71678eaedd5fd714eebb3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c838631b8753a2b9b2da42107bf5aa019aaf61a498a71678eaedd5fd714eebb3.dll,#12⤵PID:4032
-