Analysis
-
max time kernel
68s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 20:29
Behavioral task
behavioral1
Sample
c58c9f942ddf7e32df7e3722ff76b4182dd2de8998eb50e67fc213bca2c44306.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c58c9f942ddf7e32df7e3722ff76b4182dd2de8998eb50e67fc213bca2c44306.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c58c9f942ddf7e32df7e3722ff76b4182dd2de8998eb50e67fc213bca2c44306.dll
-
Size
62KB
-
MD5
88cb08d0a2f66985442b9622939de611
-
SHA1
2b71e61986475f5b8b9f6b7197412d5139bf9196
-
SHA256
c58c9f942ddf7e32df7e3722ff76b4182dd2de8998eb50e67fc213bca2c44306
-
SHA512
076bd21acec8c91c27900204c19746671f2e25589c927b9317454e56d60c7a0866d4ef975db0823b07f48735cf1e4cfd5966cf488fcd19b507d7d24fc730d52c
-
SSDEEP
1536:OsuX6JN3TSdK0KaktcDIgG/YT8OeeyDPoQvfEv:1/bAtktcUgGgT8OPIAQHEv
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3472 wrote to memory of 2032 3472 rundll32.exe 80 PID 3472 wrote to memory of 2032 3472 rundll32.exe 80 PID 3472 wrote to memory of 2032 3472 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c58c9f942ddf7e32df7e3722ff76b4182dd2de8998eb50e67fc213bca2c44306.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c58c9f942ddf7e32df7e3722ff76b4182dd2de8998eb50e67fc213bca2c44306.dll,#12⤵PID:2032
-