Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
f3aed06f2b6d9587fd92fde922e59bbc86ce8cb4e472f31aee293f6cc1ee8034.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3aed06f2b6d9587fd92fde922e59bbc86ce8cb4e472f31aee293f6cc1ee8034.dll
Resource
win10v2004-20220812-en
General
-
Target
f3aed06f2b6d9587fd92fde922e59bbc86ce8cb4e472f31aee293f6cc1ee8034.dll
-
Size
33KB
-
MD5
0f65fdf7665b566a58008647ade9bfcd
-
SHA1
00ba575e9286419a6ada8546b70d024f9e8965ea
-
SHA256
f3aed06f2b6d9587fd92fde922e59bbc86ce8cb4e472f31aee293f6cc1ee8034
-
SHA512
026fbde1b6beea60282af316bee3876a5ebcdace99083f6571f5d2863fc3913646623fdb371d9ccc51952b0fd4139da8f4e8574c23721d2ae17b9e3446ef3680
-
SSDEEP
768:gSn1bTS2JZHNZCyxpzm7N6X7Lfdhh5hcD/4s+pR3zS2TkET:gSn1bTSypSu7LFhzC8s+pRjIY
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3796 wrote to memory of 3644 3796 rundll32.exe 81 PID 3796 wrote to memory of 3644 3796 rundll32.exe 81 PID 3796 wrote to memory of 3644 3796 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3aed06f2b6d9587fd92fde922e59bbc86ce8cb4e472f31aee293f6cc1ee8034.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3aed06f2b6d9587fd92fde922e59bbc86ce8cb4e472f31aee293f6cc1ee8034.dll,#12⤵PID:3644
-