Analysis
-
max time kernel
178s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
3d1fd220e2da016f1000fbf7994e5aed3f09ed1894652a1f1f2d56c17741dac9.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d1fd220e2da016f1000fbf7994e5aed3f09ed1894652a1f1f2d56c17741dac9.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
3d1fd220e2da016f1000fbf7994e5aed3f09ed1894652a1f1f2d56c17741dac9.dll
-
Size
226KB
-
MD5
0cf9c8e268c03ef887cb0b800d3c2926
-
SHA1
6bf9a8bc34bf362f388d1ed4ace86c46b9428353
-
SHA256
3d1fd220e2da016f1000fbf7994e5aed3f09ed1894652a1f1f2d56c17741dac9
-
SHA512
6d5d981a3c8ca83a27354453f940000c6a890834258f5da0539d11c25c90d83a71503cff815a77bfb8813314ca8e61ed07a3aa86b169b56b52f4ea70bbe7553c
-
SSDEEP
6144:B6ELlYE7/hAZUvPucYE05eLCjEMoDyuI5:gJ8hiU+HwMoD9W
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4192 wrote to memory of 3548 4192 rundll32.exe 78 PID 4192 wrote to memory of 3548 4192 rundll32.exe 78 PID 4192 wrote to memory of 3548 4192 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d1fd220e2da016f1000fbf7994e5aed3f09ed1894652a1f1f2d56c17741dac9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d1fd220e2da016f1000fbf7994e5aed3f09ed1894652a1f1f2d56c17741dac9.dll,#12⤵PID:3548
-