Analysis
-
max time kernel
244s -
max time network
329s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
3f3cbd3f8f49c8aebaec228c7883ce9001a4be92b94350852c9963593f8287bd.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3f3cbd3f8f49c8aebaec228c7883ce9001a4be92b94350852c9963593f8287bd.dll
Resource
win10v2004-20221111-en
General
-
Target
3f3cbd3f8f49c8aebaec228c7883ce9001a4be92b94350852c9963593f8287bd.dll
-
Size
164KB
-
MD5
ee61036da76f5b51a56f8352701eea8f
-
SHA1
b724a47f2e3c6dc2de4932b88b4beae5bd937fd8
-
SHA256
3f3cbd3f8f49c8aebaec228c7883ce9001a4be92b94350852c9963593f8287bd
-
SHA512
a3b6bb1dae07f7481c69100bd3295399a3bcd60b216572f5e300da50c14082b735f61d80cb86be03345ab23416dcb56fad93567dfa2175817d004acf637d4c2a
-
SSDEEP
3072:ur4gB57SUXQ2YnJG82AqA49mFg4jo2gOWNp13wya:50vdqJG9d9X4nWNH
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4220 3040 rundll32.exe 81 PID 3040 wrote to memory of 4220 3040 rundll32.exe 81 PID 3040 wrote to memory of 4220 3040 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f3cbd3f8f49c8aebaec228c7883ce9001a4be92b94350852c9963593f8287bd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f3cbd3f8f49c8aebaec228c7883ce9001a4be92b94350852c9963593f8287bd.dll,#12⤵PID:4220
-