Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 17:22
Static task
static1
Behavioral task
behavioral1
Sample
3089a6fe0b191858f1c5e862dc809ece.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3089a6fe0b191858f1c5e862dc809ece.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
3089a6fe0b191858f1c5e862dc809ece.dll
-
Size
1.5MB
-
MD5
3089a6fe0b191858f1c5e862dc809ece
-
SHA1
43c934b2483b75d391bb13f00c37e803d8568868
-
SHA256
fc9e0cd533398d4a208b2036d6510d32ebe141afbae50d3304dbd0b0e4ac8ee9
-
SHA512
3ca71c7543d6e04bed73b9bcd50bb173b0473c6fba1f5be44f2aaebcbe399d7c12bf48f3d7c0d199cccdd669ca24f84836b9feb9b085b3cdd7a843dcfd3f3670
-
SSDEEP
24576:lBk3SieSII7pKRS0lCR+VRhZSLAc6EE0EuAQTRPTnC8pJsv6tWKFdu9CcAVmR5ux:lB4SieFuKRUqh6bVCub9TnCGJsv6tWKd
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3324 wrote to memory of 3580 3324 rundll32.exe 14 PID 3324 wrote to memory of 3580 3324 rundll32.exe 14 PID 3324 wrote to memory of 3580 3324 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3089a6fe0b191858f1c5e862dc809ece.dll,#11⤵PID:3580
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3089a6fe0b191858f1c5e862dc809ece.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3324