Analysis
-
max time kernel
171s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
3d3e734ff0e941b0d044167536931df9f80116e2dfd6c89f693f6f82d44dd6ec.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3d3e734ff0e941b0d044167536931df9f80116e2dfd6c89f693f6f82d44dd6ec.dll
Resource
win10v2004-20220812-en
General
-
Target
3d3e734ff0e941b0d044167536931df9f80116e2dfd6c89f693f6f82d44dd6ec.dll
-
Size
156KB
-
MD5
d158d07b70b6035cb98e3286d673a7e6
-
SHA1
a26374df4f6ff52832ab03f65446f05dfe37788b
-
SHA256
3d3e734ff0e941b0d044167536931df9f80116e2dfd6c89f693f6f82d44dd6ec
-
SHA512
1b52f16012938c0a2cb64439d34353b4c149fe2e86c4a979acedb8147e88cc1948a089a1f265f8ce829a7bc1fd2d06eaddcee4aa677913694ad299386b25b8e6
-
SSDEEP
3072:GReNjxLEVrXGfYoUWb5dDd+BFfEuklc7u+Kas3iT:G4N9LEjGfYrWb5dsnEuklis8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 2184 4440 rundll32.exe 80 PID 4440 wrote to memory of 2184 4440 rundll32.exe 80 PID 4440 wrote to memory of 2184 4440 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d3e734ff0e941b0d044167536931df9f80116e2dfd6c89f693f6f82d44dd6ec.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d3e734ff0e941b0d044167536931df9f80116e2dfd6c89f693f6f82d44dd6ec.dll,#12⤵PID:2184
-