Analysis
-
max time kernel
125s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 20:04
Behavioral task
behavioral1
Sample
e40186d06972eceb8ac754241a3d7c9c23451cc7d6f9be34b22ec30f67c12f51.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
e40186d06972eceb8ac754241a3d7c9c23451cc7d6f9be34b22ec30f67c12f51.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
e40186d06972eceb8ac754241a3d7c9c23451cc7d6f9be34b22ec30f67c12f51.dll
-
Size
74KB
-
MD5
54ec7f515fd1071aaf1941bb048cc6b9
-
SHA1
2cd347a6912520793b1f630fe1e7ed3ea19768e8
-
SHA256
e40186d06972eceb8ac754241a3d7c9c23451cc7d6f9be34b22ec30f67c12f51
-
SHA512
b560fd49ef61e526c948021196be8cc18519bc66d4c142315672a7320fcfdbcb119bf79d63234118b6803604eca2f4731eb47c8ba839143877f26af15a21a60e
-
SSDEEP
1536:n7ZLNPp9pZBMC2lrt84/VnL4jayB/r98g77Mlce/TO5p:7Zppl2lrthl4XxZZ7u/a5p
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1336 1504 rundll32.exe 56 PID 1504 wrote to memory of 1336 1504 rundll32.exe 56 PID 1504 wrote to memory of 1336 1504 rundll32.exe 56
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e40186d06972eceb8ac754241a3d7c9c23451cc7d6f9be34b22ec30f67c12f51.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e40186d06972eceb8ac754241a3d7c9c23451cc7d6f9be34b22ec30f67c12f51.dll,#12⤵PID:1336
-