Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 23:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3b5a4a621937f0604e26fa753772ad69.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3b5a4a621937f0604e26fa753772ad69.dll
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
3b5a4a621937f0604e26fa753772ad69.dll
-
Size
1.4MB
-
MD5
3b5a4a621937f0604e26fa753772ad69
-
SHA1
4ec7d75674ca9035a722331cbea860ee48734ae2
-
SHA256
5e9be3bf5292debaf7d6601739102c614f4b181c15f76e9a0d939aeb070bb036
-
SHA512
50c9094d37499ce252fcbe8f5d4da8d5aea8a046e5c43e804726e70d0657085180d132aaacb92367ecc3f7b358985f605b8b5e429ca781cf843980702e7cfc21
-
SSDEEP
24576:Stmh6IvMTdQam3mKf2TBSLqwXPxQP7jxtkGw4vZjf2:SIYI0TTmWKf28LdxkfPk2jf
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rundll32.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2772 wrote to memory of 4124 2772 rundll32.exe 14 PID 2772 wrote to memory of 4124 2772 rundll32.exe 14 PID 2772 wrote to memory of 4124 2772 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b5a4a621937f0604e26fa753772ad69.dll,#11⤵
- Drops file in System32 directory
PID:4124
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b5a4a621937f0604e26fa753772ad69.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2772