Analysis
-
max time kernel
181s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 01:24
Behavioral task
behavioral1
Sample
ae92943b792030cff73924e8604d02b781f0b25a0939aca5f097bf13642b5902.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ae92943b792030cff73924e8604d02b781f0b25a0939aca5f097bf13642b5902.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
ae92943b792030cff73924e8604d02b781f0b25a0939aca5f097bf13642b5902.dll
-
Size
74KB
-
MD5
d79a2cacbdf946f89ca6c7f626b4dddd
-
SHA1
70bc203c5493bdad1c12c62c896b6c44c7b90a58
-
SHA256
ae92943b792030cff73924e8604d02b781f0b25a0939aca5f097bf13642b5902
-
SHA512
e98619c12db45cd6b7e8b12881ae780b7a81478d9bce52533b37681d78d42c5f247ec89c9edf24996bcbb7e1f05182f46780b75c86175fdf9ddbf98f7776bb55
-
SSDEEP
1536:yl3E0T9BRzbyuy1je2GUUrf+N3L5ix6VMgh+66bJA:E393Rzuu048HB5h+7bJA
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1396 wrote to memory of 2552 1396 rundll32.exe 82 PID 1396 wrote to memory of 2552 1396 rundll32.exe 82 PID 1396 wrote to memory of 2552 1396 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae92943b792030cff73924e8604d02b781f0b25a0939aca5f097bf13642b5902.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae92943b792030cff73924e8604d02b781f0b25a0939aca5f097bf13642b5902.dll,#12⤵PID:2552
-