Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 20:33
Behavioral task
behavioral1
Sample
7abcb6bb52042b5b82940f9b6752b02f0bffe5dbdbbd1b896b1542bcabfe71d8.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7abcb6bb52042b5b82940f9b6752b02f0bffe5dbdbbd1b896b1542bcabfe71d8.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
7abcb6bb52042b5b82940f9b6752b02f0bffe5dbdbbd1b896b1542bcabfe71d8.dll
-
Size
77KB
-
MD5
9f4d9e707319979da6cde84c05aab900
-
SHA1
52f8c24daa35212f485cf9726ae4d7c87cf67a0f
-
SHA256
7abcb6bb52042b5b82940f9b6752b02f0bffe5dbdbbd1b896b1542bcabfe71d8
-
SHA512
02ce90985583ec071a62f7f4e918a98466a23953ec635ea0baacc90a3dc112b0db62801b5954e8b8a927d591bdc74ed074b7505ccd796e3470225672a9993c7a
-
SSDEEP
1536:yl3E0TZ+Bg1Z5rfSUQbRU4WhspqESLVMBSWpeS+sbC:E39Gg13SUQNdk0iZWpewC
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3172 wrote to memory of 3504 3172 rundll32.exe 79 PID 3172 wrote to memory of 3504 3172 rundll32.exe 79 PID 3172 wrote to memory of 3504 3172 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7abcb6bb52042b5b82940f9b6752b02f0bffe5dbdbbd1b896b1542bcabfe71d8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7abcb6bb52042b5b82940f9b6752b02f0bffe5dbdbbd1b896b1542bcabfe71d8.dll,#12⤵PID:3504
-