Analysis
-
max time kernel
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2024 15:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e12f3dda3d22d1ea805455cfc9994fa.dll
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3e12f3dda3d22d1ea805455cfc9994fa.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
3e12f3dda3d22d1ea805455cfc9994fa.dll
-
Size
25KB
-
MD5
3e12f3dda3d22d1ea805455cfc9994fa
-
SHA1
9c05050f4f02fcec1ca6a47a2c2ac00eefd02f20
-
SHA256
01d40b8356806999c7e82b65fa37dd5d5f3c4d0c4ebf575160d876c1cac9c86e
-
SHA512
ec1c688439cf0fe32dc172d89132b123ad222a1b030f6999421bf764337365981f52ed99bf4798e76a7ec8a6e83de649102cd816a25e495cf2a5ef5a741cbe93
-
SSDEEP
384:S7dxz0CuAkqd+1TkQattckmCLPlo6B3aAWp54oFh0vAz5rxQ/MQ3c:SgCuVqdSAQWPmCLG6c4JI5rx+MQs
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4448 wrote to memory of 5800 4448 rundll32.exe 17 PID 4448 wrote to memory of 5800 4448 rundll32.exe 17 PID 4448 wrote to memory of 5800 4448 rundll32.exe 17
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e12f3dda3d22d1ea805455cfc9994fa.dll,#11⤵PID:5800
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e12f3dda3d22d1ea805455cfc9994fa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4448