Analysis
-
max time kernel
91s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 03:37
Behavioral task
behavioral1
Sample
3f46af739d10218b6164691a01e880f8dd6fdba210a6593f057e867990f73584.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f46af739d10218b6164691a01e880f8dd6fdba210a6593f057e867990f73584.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
3f46af739d10218b6164691a01e880f8dd6fdba210a6593f057e867990f73584.dll
-
Size
99KB
-
MD5
8039166f56d43b95a10cc3cdaa18f030
-
SHA1
5b77c2d23e738daac5448740589fe36cc65f98e9
-
SHA256
3f46af739d10218b6164691a01e880f8dd6fdba210a6593f057e867990f73584
-
SHA512
29594b14e4e889a8d53a94642070cea63bff4a19b9dc2e757f9941de72ae3d82c3ccf68a04cb3fd58cf9664501ab4dc8a2d9160e184d15799af9e8b1c8a3250f
-
SSDEEP
1536:XrEzMwFTZ/2AINge4/wRdPezW/4EezdZhUtFQCv0Y0y3r3SUW:AzPF9//e4wRgW/4PZZhUAC8y3bs
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4584 wrote to memory of 4980 4584 rundll32.exe 78 PID 4584 wrote to memory of 4980 4584 rundll32.exe 78 PID 4584 wrote to memory of 4980 4584 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f46af739d10218b6164691a01e880f8dd6fdba210a6593f057e867990f73584.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f46af739d10218b6164691a01e880f8dd6fdba210a6593f057e867990f73584.dll,#12⤵PID:4980
-