Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
a2e1b137bdf439021964b58a2725b784d277e830be193b6b22bf1da8c6251eac.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2e1b137bdf439021964b58a2725b784d277e830be193b6b22bf1da8c6251eac.dll
Resource
win10v2004-20220812-en
General
-
Target
a2e1b137bdf439021964b58a2725b784d277e830be193b6b22bf1da8c6251eac.dll
-
Size
5KB
-
MD5
a2fc8d2045ced2720da7760c7531f470
-
SHA1
2409497a0b87371eaaadc405e5a13c08aa93f02a
-
SHA256
a2e1b137bdf439021964b58a2725b784d277e830be193b6b22bf1da8c6251eac
-
SHA512
4e0ca89fca67b2cb6345a3311887da4d60ae00e5c198b49a28882fb8bbf9c5433caea60dfc0045db7548f528991574209c6cdea6f58155caca0379f4cb954141
-
SSDEEP
48:C6Vo9HBok7lYa92RranDBetlG9Mg8l9cAf+WqLwVR9q/n8FgCqvgCijOIkVT+t:nI2RrUeqOHcHWx9Cn8h69gxk
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4028 wrote to memory of 4032 4028 rundll32.exe 84 PID 4028 wrote to memory of 4032 4028 rundll32.exe 84 PID 4028 wrote to memory of 4032 4028 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2e1b137bdf439021964b58a2725b784d277e830be193b6b22bf1da8c6251eac.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2e1b137bdf439021964b58a2725b784d277e830be193b6b22bf1da8c6251eac.dll,#12⤵PID:4032
-