Analysis
-
max time kernel
144s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
a3eb5c9f732fceb2f05c66c6ae27c09c246bc83fe4e992cd2ac63249a719e5bc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3eb5c9f732fceb2f05c66c6ae27c09c246bc83fe4e992cd2ac63249a719e5bc.dll
Resource
win10v2004-20221111-en
General
-
Target
a3eb5c9f732fceb2f05c66c6ae27c09c246bc83fe4e992cd2ac63249a719e5bc.dll
-
Size
30KB
-
MD5
43c360904567b52ec36a2e6b11223140
-
SHA1
35ce3dbb1d4a52d0b73148232efc1f9c1e99f542
-
SHA256
a3eb5c9f732fceb2f05c66c6ae27c09c246bc83fe4e992cd2ac63249a719e5bc
-
SHA512
9d86753df5fa28c180a7e3399326a64d17018f2df790f85fac6bfc77f04cfd072f75a88ac5571cc1cc7d66a050d8eed8082c7230a4d7f341b740349a4e2a3a3d
-
SSDEEP
96:DBxUt5T0t/4bmkmKUk+NIlXadkvNOm4YDfnJZoMMMMMMMMMMMMMXMMMMMMMMMMM7:VRRQmkmHk+NIlKa1O0xMtMNwbHEcvT
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1212 wrote to memory of 4088 1212 rundll32.exe 84 PID 1212 wrote to memory of 4088 1212 rundll32.exe 84 PID 1212 wrote to memory of 4088 1212 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3eb5c9f732fceb2f05c66c6ae27c09c246bc83fe4e992cd2ac63249a719e5bc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3eb5c9f732fceb2f05c66c6ae27c09c246bc83fe4e992cd2ac63249a719e5bc.dll,#12⤵PID:4088
-