Analysis
-
max time kernel
135s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
e41567015b34afa4797d7fb166a786dd5acd5b395a4525185e6eadc4cc3b39c2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e41567015b34afa4797d7fb166a786dd5acd5b395a4525185e6eadc4cc3b39c2.dll
Resource
win10v2004-20220812-en
General
-
Target
e41567015b34afa4797d7fb166a786dd5acd5b395a4525185e6eadc4cc3b39c2.dll
-
Size
4KB
-
MD5
5a756373939200fe60e9199d242aa675
-
SHA1
ae10977e81aa3af1e83f7b1ac28df0e781b3dd21
-
SHA256
e41567015b34afa4797d7fb166a786dd5acd5b395a4525185e6eadc4cc3b39c2
-
SHA512
24b585291b1993becf0d282a848ff2bb463d485166068203af1c29f78998addb46235e0c18f2a331dc4add47b311f5ee19c69b3869d843b1b3a916e1ee08ef6d
-
SSDEEP
48:a5zjMTGcITBVQVE1lc1M1V+lBLtP+9yjMOyJuTPiRpmEW:iT3Qu8AV+LLtG9yjVyJuuk
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4516 wrote to memory of 3212 4516 rundll32.exe 81 PID 4516 wrote to memory of 3212 4516 rundll32.exe 81 PID 4516 wrote to memory of 3212 4516 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e41567015b34afa4797d7fb166a786dd5acd5b395a4525185e6eadc4cc3b39c2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e41567015b34afa4797d7fb166a786dd5acd5b395a4525185e6eadc4cc3b39c2.dll,#12⤵PID:3212
-