Analysis
-
max time kernel
184s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 05:21
Static task
static1
Behavioral task
behavioral1
Sample
39e9d1cd9e10c03c1d7f3c8d32b6374eb7f9aa4661e7c6199f332e1687394f1f.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
39e9d1cd9e10c03c1d7f3c8d32b6374eb7f9aa4661e7c6199f332e1687394f1f.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
39e9d1cd9e10c03c1d7f3c8d32b6374eb7f9aa4661e7c6199f332e1687394f1f.dll
-
Size
3KB
-
MD5
622b3fe08a7805e807b2811a9e9ca6e0
-
SHA1
974502b93eadfd2ccab98003f785d41dee3e0ac9
-
SHA256
39e9d1cd9e10c03c1d7f3c8d32b6374eb7f9aa4661e7c6199f332e1687394f1f
-
SHA512
d03c34ec27dc7ef1a6d6a2fb35aae6a66f073bf332a0e602e6e211cc7983f39363e4c95d3627672c17b6e0aab59c93ba4f0f19a9c6e219ca36fe2f86805c1a35
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4368 wrote to memory of 4876 4368 rundll32.exe 83 PID 4368 wrote to memory of 4876 4368 rundll32.exe 83 PID 4368 wrote to memory of 4876 4368 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39e9d1cd9e10c03c1d7f3c8d32b6374eb7f9aa4661e7c6199f332e1687394f1f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39e9d1cd9e10c03c1d7f3c8d32b6374eb7f9aa4661e7c6199f332e1687394f1f.dll,#12⤵PID:4876
-