Analysis
-
max time kernel
92s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2022, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
0e98114e2891356e536d6369a43258fecd23c9806bc0d9ab3420ea5bed9336db.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0e98114e2891356e536d6369a43258fecd23c9806bc0d9ab3420ea5bed9336db.dll
Resource
win10v2004-20220812-en
General
-
Target
0e98114e2891356e536d6369a43258fecd23c9806bc0d9ab3420ea5bed9336db.dll
-
Size
36KB
-
MD5
d3a62961511095c3ed2eb99b695276f5
-
SHA1
a9abb9fe21fae5c8e29656b5c4f472b67b29df98
-
SHA256
0e98114e2891356e536d6369a43258fecd23c9806bc0d9ab3420ea5bed9336db
-
SHA512
15f555bac6f3748d0ad567356873220f35573360658cc5ec6a3223c64e1b59841927051d2d76252d148f55a2947b4dcc41c1f58b2803fa8d244cdfd45fae7c2e
-
SSDEEP
768:SL7SQttqhPfaz2ZYOXCm1+E7/S3lVfQ5hNfbRgzcfjhbdG:S3SQttUFYOXdB7elxuvDRg4q
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4084 wrote to memory of 1564 4084 rundll32.exe 80 PID 4084 wrote to memory of 1564 4084 rundll32.exe 80 PID 4084 wrote to memory of 1564 4084 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e98114e2891356e536d6369a43258fecd23c9806bc0d9ab3420ea5bed9336db.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e98114e2891356e536d6369a43258fecd23c9806bc0d9ab3420ea5bed9336db.dll,#12⤵PID:1564
-