Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 21:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
11a98a82b60e346977eaf03edac97ee13ea456f0b615a362010d5296735e8654.dll
Resource
win7-20230703-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
11a98a82b60e346977eaf03edac97ee13ea456f0b615a362010d5296735e8654.dll
Resource
win10v2004-20230703-en
1 signatures
150 seconds
General
-
Target
11a98a82b60e346977eaf03edac97ee13ea456f0b615a362010d5296735e8654.dll
-
Size
204KB
-
MD5
b594a8be94fb449575bab27b8767b434
-
SHA1
7d11206c5f30467137fd3b8ab80142d1a6833141
-
SHA256
11a98a82b60e346977eaf03edac97ee13ea456f0b615a362010d5296735e8654
-
SHA512
6b822163f31674d9081f244d95a62c2334aea0de6accfda4ff9375c550ea84732a7c6f50350694cfe56ee5b6c0bc9abda246fc2957958869cffe04f502d4fd07
-
SSDEEP
6144:PxhFYd1mq4VhnDA9G620Avz+iIUvxd93pd1j:d8m5NhJx
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3996 wrote to memory of 640 3996 rundll32.exe 81 PID 3996 wrote to memory of 640 3996 rundll32.exe 81 PID 3996 wrote to memory of 640 3996 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11a98a82b60e346977eaf03edac97ee13ea456f0b615a362010d5296735e8654.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11a98a82b60e346977eaf03edac97ee13ea456f0b615a362010d5296735e8654.dll,#12⤵PID:640
-