Analysis
-
max time kernel
144s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 20:41
Behavioral task
behavioral1
Sample
7f491afa07f20494db77674d623deb6d31c01d1e6c020a95ccafe2c9dfd725fc.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7f491afa07f20494db77674d623deb6d31c01d1e6c020a95ccafe2c9dfd725fc.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
7f491afa07f20494db77674d623deb6d31c01d1e6c020a95ccafe2c9dfd725fc.dll
-
Size
63KB
-
MD5
5fb43811914173056b85bda9a66df8c0
-
SHA1
8d3234aa3fb84c30d0561dbb0f593d8fff10ea74
-
SHA256
7f491afa07f20494db77674d623deb6d31c01d1e6c020a95ccafe2c9dfd725fc
-
SHA512
a2fe2dddb13e5cdc919bfaedff1bb109f02241cadd89e89f7976bba5996b81716240aea4ff298dc5048c34dc8e82cf1c635440b3711f6f253fa811cc893ad144
-
SSDEEP
1536:1zExMwCGQ2j4Nf6nXA3QtPX2wMc+JzUP0lWij0O:1I+wCGvCfGA3QD9+RUMlJ7
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2144 wrote to memory of 4056 2144 rundll32.exe 83 PID 2144 wrote to memory of 4056 2144 rundll32.exe 83 PID 2144 wrote to memory of 4056 2144 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f491afa07f20494db77674d623deb6d31c01d1e6c020a95ccafe2c9dfd725fc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f491afa07f20494db77674d623deb6d31c01d1e6c020a95ccafe2c9dfd725fc.dll,#12⤵PID:4056
-