Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
c3d3b88c8921489f11730a40b4712194308a7148a886ca593c424ce918ae3383.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c3d3b88c8921489f11730a40b4712194308a7148a886ca593c424ce918ae3383.dll
Resource
win10v2004-20220812-en
General
-
Target
c3d3b88c8921489f11730a40b4712194308a7148a886ca593c424ce918ae3383.dll
-
Size
215KB
-
MD5
c166d4302e26ec26e7b64a16e89c9185
-
SHA1
72a15234f55e5ae85c5f3a17c187c6eba0b5f0b9
-
SHA256
c3d3b88c8921489f11730a40b4712194308a7148a886ca593c424ce918ae3383
-
SHA512
ddf27e078af20b5e0b5e6fc7554f5fd7f55f39adb803b1ed57e7b51f4f89e2a54eb29845592e987cac3c3aa576ddf729da4c704895c46bcb444f3250483eb1dd
-
SSDEEP
6144:jbRTnaXWszjtAC6i94s2Gs7y6sSCwef5vyixlqmmm/bPULuLSUJLJr+CRV7Z2xTf:ZOgCSTZtb3qKAu0QW1vr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3d3b88c8921489f11730a40b4712194308a7148a886ca593c424ce918ae3383.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3d3b88c8921489f11730a40b4712194308a7148a886ca593c424ce918ae3383.dll,#12⤵PID:1940
-