Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 20:30
Behavioral task
behavioral1
Sample
d1b08d997f7dbaf202dd42bc3a978218f234911aea77c290b2037912718ee66e.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d1b08d997f7dbaf202dd42bc3a978218f234911aea77c290b2037912718ee66e.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
d1b08d997f7dbaf202dd42bc3a978218f234911aea77c290b2037912718ee66e.dll
-
Size
49KB
-
MD5
75bd5f86cbde78ea2a59f02975c822b0
-
SHA1
912686243f81fed39a351c8deeebcd775e0cf0b5
-
SHA256
d1b08d997f7dbaf202dd42bc3a978218f234911aea77c290b2037912718ee66e
-
SHA512
81da8640f077e6e6f551dc69272aa15bf462b46a8b24883d2625b3715a5e3e13d8919bf1292d4741f707af8c5caf55e39faeab1a91f64f923225df966f4c40f1
-
SSDEEP
768:e6gzP+ViK97Hcc9GVIxrXR+MW8ftWZkKRHz/xtKAGgUhM5zegih:e6PViKlP98grX88ftKTRHz/zKHgMM4gc
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1744 wrote to memory of 4924 1744 rundll32.exe 82 PID 1744 wrote to memory of 4924 1744 rundll32.exe 82 PID 1744 wrote to memory of 4924 1744 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d1b08d997f7dbaf202dd42bc3a978218f234911aea77c290b2037912718ee66e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d1b08d997f7dbaf202dd42bc3a978218f234911aea77c290b2037912718ee66e.dll,#12⤵PID:4924
-