Analysis
-
max time kernel
148s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 01:24
Behavioral task
behavioral1
Sample
71838f69484553e3fd95dfaa9f2a3b7a57db09b3ec3d932a3346fd58f638158f.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
71838f69484553e3fd95dfaa9f2a3b7a57db09b3ec3d932a3346fd58f638158f.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
71838f69484553e3fd95dfaa9f2a3b7a57db09b3ec3d932a3346fd58f638158f.dll
-
Size
4KB
-
MD5
9116c8997d7cebd5da964d168a450900
-
SHA1
cd3c998a2ee6b5fff67a74d71105d9f9e6f70b1a
-
SHA256
71838f69484553e3fd95dfaa9f2a3b7a57db09b3ec3d932a3346fd58f638158f
-
SHA512
f6be9fb1adb562aec855d09fb59ee047e199dd9a73d0a4943156532352ea6a276f07b9154c4a4782409b7baca42a4d0f62306064003bab6d58a905702467aaa6
-
SSDEEP
48:a5zuMqBcq06phM/wwWLSeJY8JTa6Il+Lkrxg6fjyP0V8LYgIeiU/uRuA8EHTyB4L:TRphMzf8ATI0+LxIm/muMGBoLB
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4288 4604 rundll32.exe 84 PID 4604 wrote to memory of 4288 4604 rundll32.exe 84 PID 4604 wrote to memory of 4288 4604 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71838f69484553e3fd95dfaa9f2a3b7a57db09b3ec3d932a3346fd58f638158f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71838f69484553e3fd95dfaa9f2a3b7a57db09b3ec3d932a3346fd58f638158f.dll,#12⤵PID:4288
-