Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 15:14
Static task
static1
Behavioral task
behavioral1
Sample
3243e99606ecf3e6199b501ad6263150e0250ad7147436ee95fcfeb1c3e6a861.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3243e99606ecf3e6199b501ad6263150e0250ad7147436ee95fcfeb1c3e6a861.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
3243e99606ecf3e6199b501ad6263150e0250ad7147436ee95fcfeb1c3e6a861.dll
-
Size
72KB
-
MD5
ef93299ea46649d78df9617dde896ad5
-
SHA1
1e17ebeeecd409ae85488947980b98ac94e7ccc6
-
SHA256
3243e99606ecf3e6199b501ad6263150e0250ad7147436ee95fcfeb1c3e6a861
-
SHA512
adeab069c312e50ac8208057154f65991fe173b31269b8f217d111b0513989b6c43c02ad3ee4a226f54cce7422e077ad249b75075538bf13268f24d5af205c25
-
SSDEEP
1536:aUPMadZgQ24x/tCcgQFPvXGNRfWlAPClJO:aT8KQ2K/txrt2NNClJ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4704 5040 rundll32.exe 80 PID 5040 wrote to memory of 4704 5040 rundll32.exe 80 PID 5040 wrote to memory of 4704 5040 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3243e99606ecf3e6199b501ad6263150e0250ad7147436ee95fcfeb1c3e6a861.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3243e99606ecf3e6199b501ad6263150e0250ad7147436ee95fcfeb1c3e6a861.dll,#12⤵PID:4704
-