Analysis
-
max time kernel
5s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 21:15
Static task
static1
Behavioral task
behavioral1
Sample
337d8f8afa16780a821bc1c9f094dd7302c5fd9e1edd470920b6df47ed46bdbf.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
337d8f8afa16780a821bc1c9f094dd7302c5fd9e1edd470920b6df47ed46bdbf.dll
Resource
win10v2004-20220812-en
General
-
Target
337d8f8afa16780a821bc1c9f094dd7302c5fd9e1edd470920b6df47ed46bdbf.dll
-
Size
652KB
-
MD5
0ddf47e2a81e071c8c02d068efb6dc10
-
SHA1
4c8eba6c375df154171c8174a3448e982edf371c
-
SHA256
337d8f8afa16780a821bc1c9f094dd7302c5fd9e1edd470920b6df47ed46bdbf
-
SHA512
0de2fd56fd2a965496299c492494ae74c6cb8e540ab0c96b89b4cf6290cbf44701629ccac3c16cbcc5f08a623d0d77aa8898cba2d5ba87b65d40e401e3680744
-
SSDEEP
6144:ryFWeVNzYakPdVsveysoChHStLoQ4oRvsY9hckEWJroTNpcAup3pIKonIQJNd:ryFWeV8PdcrsoChyd3UJWKTkJVuHd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 848 wrote to memory of 4436 848 rundll32.exe 21 PID 848 wrote to memory of 4436 848 rundll32.exe 21 PID 848 wrote to memory of 4436 848 rundll32.exe 21
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\337d8f8afa16780a821bc1c9f094dd7302c5fd9e1edd470920b6df47ed46bdbf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\337d8f8afa16780a821bc1c9f094dd7302c5fd9e1edd470920b6df47ed46bdbf.dll,#12⤵PID:4436
-