Analysis
-
max time kernel
251s -
max time network
341s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
fe32fdf2e1f8d6cacd11552e9c43afb8372ac8c550fcacfd02351ecb9ec829b6.dll
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
fe32fdf2e1f8d6cacd11552e9c43afb8372ac8c550fcacfd02351ecb9ec829b6.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
fe32fdf2e1f8d6cacd11552e9c43afb8372ac8c550fcacfd02351ecb9ec829b6.dll
-
Size
1.0MB
-
MD5
109d1a299bca8a9cbbd542772ebc5581
-
SHA1
a1c3f153a225beadcd297250b5c3e44d31ddaeb6
-
SHA256
fe32fdf2e1f8d6cacd11552e9c43afb8372ac8c550fcacfd02351ecb9ec829b6
-
SHA512
e58ab0a03e4afe790c014654e8c65415a91f14567572e8a56992c874de3b8c20db35fc453d6b5008e577c86f0b954db33ab6ca569ee055a009075897f9e8d552
-
SSDEEP
24576:P/76ZDCw2blywTXHWUBaSycop/C+ZrenQ+yn7c:P/GZDCBywcLen77
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4376 4236 rundll32.exe 80 PID 4236 wrote to memory of 4376 4236 rundll32.exe 80 PID 4236 wrote to memory of 4376 4236 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe32fdf2e1f8d6cacd11552e9c43afb8372ac8c550fcacfd02351ecb9ec829b6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe32fdf2e1f8d6cacd11552e9c43afb8372ac8c550fcacfd02351ecb9ec829b6.dll,#12⤵PID:4376
-