Analysis
-
max time kernel
9s -
max time network
2s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 14:34
Static task
static1
Behavioral task
behavioral1
Sample
33a6e5fb02f659037ba049c8e07f6c4cb28bb5f19834293f420761373d61c326.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
33a6e5fb02f659037ba049c8e07f6c4cb28bb5f19834293f420761373d61c326.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
33a6e5fb02f659037ba049c8e07f6c4cb28bb5f19834293f420761373d61c326.dll
-
Size
77KB
-
MD5
067e399a3417ee5f0cd1e4f1afc05e10
-
SHA1
f7708b0c71bf40143894eeb5e2b9cca3486ea913
-
SHA256
33a6e5fb02f659037ba049c8e07f6c4cb28bb5f19834293f420761373d61c326
-
SHA512
824adabb5c434e50d1e512404bb50687a15e391c5a0d0d335db3fe78e5f71a9c4350f4d21875a5c3e3deec339aa6626862f8b727e52ebd21a88a343d7e73829f
-
SSDEEP
1536:cHWmsuL8yN4xoi0AcR73fc8vsWjcdu8i8qY:2WUAJaQu8i7Y
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1512 wrote to memory of 4904 1512 rundll32.exe 75 PID 1512 wrote to memory of 4904 1512 rundll32.exe 75 PID 1512 wrote to memory of 4904 1512 rundll32.exe 75
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33a6e5fb02f659037ba049c8e07f6c4cb28bb5f19834293f420761373d61c326.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33a6e5fb02f659037ba049c8e07f6c4cb28bb5f19834293f420761373d61c326.dll,#12⤵PID:4904
-