Analysis
-
max time kernel
112s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 20:38
Behavioral task
behavioral1
Sample
d7400a89346a153f14a07d7379c984d8967b8d83a3fe147ceae82adabb8704f9.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d7400a89346a153f14a07d7379c984d8967b8d83a3fe147ceae82adabb8704f9.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
d7400a89346a153f14a07d7379c984d8967b8d83a3fe147ceae82adabb8704f9.dll
-
Size
60KB
-
MD5
7b394676c62c4b78818cf0f7b766fef0
-
SHA1
5e10998c68b87fbadcc9e7dba67585adde690129
-
SHA256
d7400a89346a153f14a07d7379c984d8967b8d83a3fe147ceae82adabb8704f9
-
SHA512
2de17ee869755a06dfaa9f7b3552572be22488ed3d575eff326f16fd2ad11637300e3ce88cd06fc80f225c861cb95a90543616da1f729975192acb400f45f530
-
SSDEEP
1536:GQ3tfgXKXSTaoqXKtvbuahNEk5UFiwToCMUwm4EvZhoUIkdbIIQ:VfgXKX6dvbT8xiRUp4cokddQ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1656 wrote to memory of 4504 1656 rundll32.exe 78 PID 1656 wrote to memory of 4504 1656 rundll32.exe 78 PID 1656 wrote to memory of 4504 1656 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7400a89346a153f14a07d7379c984d8967b8d83a3fe147ceae82adabb8704f9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7400a89346a153f14a07d7379c984d8967b8d83a3fe147ceae82adabb8704f9.dll,#12⤵PID:4504
-