Analysis
-
max time kernel
210s -
max time network
228s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 20:22
Behavioral task
behavioral1
Sample
d07b9ee1b3881447ac652b13c8115c6b8651f0d33dc477cb8e7971bb2621e9ac.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d07b9ee1b3881447ac652b13c8115c6b8651f0d33dc477cb8e7971bb2621e9ac.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
d07b9ee1b3881447ac652b13c8115c6b8651f0d33dc477cb8e7971bb2621e9ac.dll
-
Size
56KB
-
MD5
d33fc2c7968e99a5c1babdeff388ce4b
-
SHA1
8f8e56cbabfabfcebf93fcf95e8f87969c86e235
-
SHA256
d07b9ee1b3881447ac652b13c8115c6b8651f0d33dc477cb8e7971bb2621e9ac
-
SHA512
99311d7b55f5b0b77342a277e708426ecc4abe13f4a114fbb098b0f33fa1f70d9c397d47f3171efcde1c634c2c3736c7a0ce1164d6f725a2e3e7d577a1671775
-
SSDEEP
768:MbPCSzfg1FrY/jWWspqRogtS2gBFHQY25aKjB5l+NMBQX+OQ5iwuFQanKvMjDs:PSb//0pWQ2a25VqMuXhwOQafE
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4520 wrote to memory of 4816 4520 rundll32.exe 80 PID 4520 wrote to memory of 4816 4520 rundll32.exe 80 PID 4520 wrote to memory of 4816 4520 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d07b9ee1b3881447ac652b13c8115c6b8651f0d33dc477cb8e7971bb2621e9ac.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d07b9ee1b3881447ac652b13c8115c6b8651f0d33dc477cb8e7971bb2621e9ac.dll,#12⤵PID:4816
-