Analysis
-
max time kernel
184s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 11:22
Static task
static1
Behavioral task
behavioral1
Sample
c32a37bdbb79b666616df96a83c3b84b420a6917a3c599419d0b238a953c9ec6.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c32a37bdbb79b666616df96a83c3b84b420a6917a3c599419d0b238a953c9ec6.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c32a37bdbb79b666616df96a83c3b84b420a6917a3c599419d0b238a953c9ec6.dll
-
Size
100KB
-
MD5
8af19e82a4b13942e9f39fe830c5b317
-
SHA1
a48496a3e91ad237b01818e4dc924fead552bd91
-
SHA256
c32a37bdbb79b666616df96a83c3b84b420a6917a3c599419d0b238a953c9ec6
-
SHA512
ca9f42719e15ea2cb56efec5df1d07764c6c02cfe9cea0ab962d60bcc7a087f08aeb99348ec707841064682dd9678b48f3813bb279c4d236e8df3c3a51a5f379
-
SSDEEP
3072:VRnmBFSdglY5+V1FsJvqOHwLsYe1RWUAR79:VRnmBFSdglHVTwqpi4U
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4744 4720 rundll32.exe 80 PID 4720 wrote to memory of 4744 4720 rundll32.exe 80 PID 4720 wrote to memory of 4744 4720 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c32a37bdbb79b666616df96a83c3b84b420a6917a3c599419d0b238a953c9ec6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c32a37bdbb79b666616df96a83c3b84b420a6917a3c599419d0b238a953c9ec6.dll,#12⤵PID:4744
-