Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/12/2022, 20:16
Behavioral task
behavioral1
Sample
7367b0b6be2c826e39559149405cf2d0c703f7a02907a8058db247c3e03f21da.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7367b0b6be2c826e39559149405cf2d0c703f7a02907a8058db247c3e03f21da.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
7367b0b6be2c826e39559149405cf2d0c703f7a02907a8058db247c3e03f21da.dll
-
Size
185KB
-
MD5
08565e5c67685c8881e5d8caa852e13c
-
SHA1
07900c23e306fe6e3301e98b9b38baa0adb965d6
-
SHA256
7367b0b6be2c826e39559149405cf2d0c703f7a02907a8058db247c3e03f21da
-
SHA512
26003ad9ab88c0a9168399418b1f2d1ad9362f410ff6194bc11a04d2a5097e91cbb5a9275cf283d7bf364c241f1108793ce7f023f255caed50497c43d4a6dc00
-
SSDEEP
3072:ewXImqM3deodCuXMRFaPj+2RqDazmmRBH65V/:Tp7RdO7N2w2zLMJ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4800 wrote to memory of 1900 4800 rundll32.exe 80 PID 4800 wrote to memory of 1900 4800 rundll32.exe 80 PID 4800 wrote to memory of 1900 4800 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7367b0b6be2c826e39559149405cf2d0c703f7a02907a8058db247c3e03f21da.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7367b0b6be2c826e39559149405cf2d0c703f7a02907a8058db247c3e03f21da.dll,#12⤵PID:1900
-