Analysis
-
max time kernel
186s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 00:06
Static task
static1
Behavioral task
behavioral1
Sample
a30e4131e7f68eaea798f10da1233ca2dc149d9a99eb56a617cad529f3ea660b.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a30e4131e7f68eaea798f10da1233ca2dc149d9a99eb56a617cad529f3ea660b.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a30e4131e7f68eaea798f10da1233ca2dc149d9a99eb56a617cad529f3ea660b.dll
-
Size
32KB
-
MD5
a3334079abe37229fbba836f546e230d
-
SHA1
0fba13de1a1e262b9296ebb898ee69918c056fb4
-
SHA256
a30e4131e7f68eaea798f10da1233ca2dc149d9a99eb56a617cad529f3ea660b
-
SHA512
8543e1096fd5fa6962bd4a6201812328e147ff5f874f641b6dac575bcafa37235c7d7e695c194a5dd52090f967adb82b6eb989c8c5d94835b2b246371d14b095
-
SSDEEP
768:wN/CMPCo5t+dOpk7Vz7LPT1IShVD8R96Cs4:wN/CMPCA4Oe57LrXHARF/
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2288 wrote to memory of 4064 2288 rundll32.exe 81 PID 2288 wrote to memory of 4064 2288 rundll32.exe 81 PID 2288 wrote to memory of 4064 2288 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a30e4131e7f68eaea798f10da1233ca2dc149d9a99eb56a617cad529f3ea660b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a30e4131e7f68eaea798f10da1233ca2dc149d9a99eb56a617cad529f3ea660b.dll,#12⤵PID:4064
-