Analysis
-
max time kernel
153s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
33b13888aad3abce9540764bcdab08f885bbb20d9a90712aaf4289649796610c.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
33b13888aad3abce9540764bcdab08f885bbb20d9a90712aaf4289649796610c.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
33b13888aad3abce9540764bcdab08f885bbb20d9a90712aaf4289649796610c.dll
-
Size
4KB
-
MD5
67b2b4a8b626b6e5605c773dd5714522
-
SHA1
d2a6b6ebe4de6650fc6bc33a712a45432c5c028a
-
SHA256
33b13888aad3abce9540764bcdab08f885bbb20d9a90712aaf4289649796610c
-
SHA512
4949ede2445c7649a5f0816d1ac44d74eadb801c6e15c043cf248cea32a668a773a886ae22f7ecf8d713f9a43d8e39d633a4baa71918e6db98114d296e241720
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5016 wrote to memory of 980 5016 rundll32.exe 82 PID 5016 wrote to memory of 980 5016 rundll32.exe 82 PID 5016 wrote to memory of 980 5016 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33b13888aad3abce9540764bcdab08f885bbb20d9a90712aaf4289649796610c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33b13888aad3abce9540764bcdab08f885bbb20d9a90712aaf4289649796610c.dll,#12⤵PID:980
-