Analysis
-
max time kernel
8s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en -
submitted
04-09-2021 13:39
Static task
static1
Behavioral task
behavioral1
Sample
e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78.dll
Resource
win10-en
windows10_x64
0 signatures
0 seconds
General
-
Target
e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78.dll
-
Size
1.2MB
-
MD5
bfac4e3c5908856ba17d41edcd455a51
-
SHA1
8eec7e888767aa9e4cca8ff246eb2aacb9170428
-
SHA256
e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
-
SHA512
2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3172 wrote to memory of 852 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 852 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 852 3172 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78.dll,#12⤵PID:852