Analysis
-
max time kernel
52s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 11:42
Behavioral task
behavioral1
Sample
a3a481ad2022dc26ce6697b1c18b5d508c6ffba7f404cdadec2f98f0df30f904.dll
Resource
win7-20221111-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a3a481ad2022dc26ce6697b1c18b5d508c6ffba7f404cdadec2f98f0df30f904.dll
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
a3a481ad2022dc26ce6697b1c18b5d508c6ffba7f404cdadec2f98f0df30f904.dll
-
Size
240KB
-
MD5
e9ea7ae3162ce56efadf1704845ba907
-
SHA1
8362c15f8b6de1ebc3a6fdc0d1e2476178e8a292
-
SHA256
a3a481ad2022dc26ce6697b1c18b5d508c6ffba7f404cdadec2f98f0df30f904
-
SHA512
4c40449920592e4acfdd4e6ebb1c64632a8214c53a7e5653697dde702fe1955dfcd2ebb074df4572adff5cf23ba6cb500c6d4e3093ba759a02f3337868ccb743
-
SSDEEP
6144:2bk3J8F8Ooga8Jv2cs+plUXoz0StnJ0nHy1nJnoaC7MSS1:2I3+GdGpXs+ppPqnHaJo7f
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1532-133-0x0000000074C10000-0x0000000074C8D000-memory.dmp vmprotect behavioral2/memory/1532-136-0x0000000074C10000-0x0000000074C8D000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1532 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 1532 4572 rundll32.exe 79 PID 4572 wrote to memory of 1532 4572 rundll32.exe 79 PID 4572 wrote to memory of 1532 4572 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3a481ad2022dc26ce6697b1c18b5d508c6ffba7f404cdadec2f98f0df30f904.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3a481ad2022dc26ce6697b1c18b5d508c6ffba7f404cdadec2f98f0df30f904.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1532 -ip 15321⤵PID:3184