Analysis
-
max time kernel
165s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
3c8653fe7fbefec930a4fab84c3a3b2b6b5f2568cac5225045c8191bbc25a9d9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c8653fe7fbefec930a4fab84c3a3b2b6b5f2568cac5225045c8191bbc25a9d9.dll
Resource
win10v2004-20220812-en
General
-
Target
3c8653fe7fbefec930a4fab84c3a3b2b6b5f2568cac5225045c8191bbc25a9d9.dll
-
Size
4KB
-
MD5
2dffffb55c40d11df3bdb6c49104ae70
-
SHA1
3ca12c61f47e0f728edb5530badb22c1e8265f7d
-
SHA256
3c8653fe7fbefec930a4fab84c3a3b2b6b5f2568cac5225045c8191bbc25a9d9
-
SHA512
4cb1e7f706f91a5989e1ee10ad840a73470039ff5fcf88f281de8965d0bdb08c41e92211a87da324db9f79c68787b1e979dc797c9d30c18a18981d8a03096a2d
-
SSDEEP
48:qHupGeMcCB96DrhWHR0FiIsipZlM+u+eAPMDQHpyuLv6omuEsJpifbYf:PMXB0rw0MI/pwbd2vofi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3844 wrote to memory of 4924 3844 rundll32.exe 81 PID 3844 wrote to memory of 4924 3844 rundll32.exe 81 PID 3844 wrote to memory of 4924 3844 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c8653fe7fbefec930a4fab84c3a3b2b6b5f2568cac5225045c8191bbc25a9d9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c8653fe7fbefec930a4fab84c3a3b2b6b5f2568cac5225045c8191bbc25a9d9.dll,#12⤵PID:4924
-