Analysis
-
max time kernel
145s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 23:13
Static task
static1
Behavioral task
behavioral1
Sample
b3fc39471a45482c2769b531b4de52d7c48a0a49f8f3df6817e4e89572bab666.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
b3fc39471a45482c2769b531b4de52d7c48a0a49f8f3df6817e4e89572bab666.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
b3fc39471a45482c2769b531b4de52d7c48a0a49f8f3df6817e4e89572bab666.dll
-
Size
72KB
-
MD5
375b81a06de9381e71f7c20b5c919820
-
SHA1
cdd8e23ee154108a5040fb5e6ea8937221375896
-
SHA256
b3fc39471a45482c2769b531b4de52d7c48a0a49f8f3df6817e4e89572bab666
-
SHA512
899e9c95f5d55a16f6fd783f031b7c92b5157d9d997d3e61aa48e38e3cc1523dce18a701aa55305769dca97ec74bdcbfd083fb440f53c841b5b9c9a52ddf23da
-
SSDEEP
1536:RluTgMCrTSo9U/Jnoi0IINxHvTrUKOX4ncpv:71TSl/JnoNvN6v
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4120 4984 rundll32.exe 82 PID 4984 wrote to memory of 4120 4984 rundll32.exe 82 PID 4984 wrote to memory of 4120 4984 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3fc39471a45482c2769b531b4de52d7c48a0a49f8f3df6817e4e89572bab666.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3fc39471a45482c2769b531b4de52d7c48a0a49f8f3df6817e4e89572bab666.dll,#12⤵PID:4120
-