Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 13:28
Behavioral task
behavioral1
Sample
e18bd5adc2af223f6749a3bb9d6c2d3c968e1b9341b19120fd993a0d7ed89d8e.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
e18bd5adc2af223f6749a3bb9d6c2d3c968e1b9341b19120fd993a0d7ed89d8e.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
e18bd5adc2af223f6749a3bb9d6c2d3c968e1b9341b19120fd993a0d7ed89d8e.dll
-
Size
138KB
-
MD5
058efae9cb16ac7932208d8702865f08
-
SHA1
1c2ac2458ab1cb3a5f15ffdb0db68d95ebb9c6f6
-
SHA256
e18bd5adc2af223f6749a3bb9d6c2d3c968e1b9341b19120fd993a0d7ed89d8e
-
SHA512
eeb871f9d4b40e54e01825473479d041a4c8015cd079f129ac125eb627221afa8d366370d5f470940f8bf9beab3a9d479ac597858b9d2e8af3d4756ffee89244
-
SSDEEP
1536:MDEFUawhF/H8fOyBAKpi44cAc8sz35QJuTh21yrVotbIkG8aCiHM:j4D/cdAK94vhsz35nTw7bHazHM
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4864-133-0x0000000010000000-0x0000000010017000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4864 4772 rundll32.exe 80 PID 4772 wrote to memory of 4864 4772 rundll32.exe 80 PID 4772 wrote to memory of 4864 4772 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e18bd5adc2af223f6749a3bb9d6c2d3c968e1b9341b19120fd993a0d7ed89d8e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e18bd5adc2af223f6749a3bb9d6c2d3c968e1b9341b19120fd993a0d7ed89d8e.dll,#12⤵PID:4864
-