Analysis
-
max time kernel
135s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 20:52
Behavioral task
behavioral1
Sample
a3d9ad11ec2008c1772d28b94b144d4904f2837d4a17e6ebe84cc1a5997fb4ea.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
a3d9ad11ec2008c1772d28b94b144d4904f2837d4a17e6ebe84cc1a5997fb4ea.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a3d9ad11ec2008c1772d28b94b144d4904f2837d4a17e6ebe84cc1a5997fb4ea.dll
-
Size
141KB
-
MD5
8da32f9ef0b2a49f035ad16539541338
-
SHA1
2c23871b8a898ade854b366e53f46dd928c43644
-
SHA256
a3d9ad11ec2008c1772d28b94b144d4904f2837d4a17e6ebe84cc1a5997fb4ea
-
SHA512
a492d777c3b569321adcd5c91e3137a433f4b4337fefa2482c5d0141484e83eee0e0e6b862574b3b898af5b8ea2ef7551cffe3de69fafa962d17a8c573fff8a4
-
SSDEEP
3072:fONjACAP9JRa4Eg50p6Q/TRM0o2UFfPTo2MvX2ok2G4+rwHvYMA+:fONUCA/Rpj1iM01STZa+rUAMA+
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 720 wrote to memory of 4332 720 rundll32.exe 83 PID 720 wrote to memory of 4332 720 rundll32.exe 83 PID 720 wrote to memory of 4332 720 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3d9ad11ec2008c1772d28b94b144d4904f2837d4a17e6ebe84cc1a5997fb4ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3d9ad11ec2008c1772d28b94b144d4904f2837d4a17e6ebe84cc1a5997fb4ea.dll,#12⤵PID:4332
-