Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
e83171163f224c95d852ab0aeb24d153dc1c12ed413cf0790184d12cb2e277ac.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e83171163f224c95d852ab0aeb24d153dc1c12ed413cf0790184d12cb2e277ac.dll
Resource
win10v2004-20221111-en
General
-
Target
e83171163f224c95d852ab0aeb24d153dc1c12ed413cf0790184d12cb2e277ac.dll
-
Size
145KB
-
MD5
2e018c724338c23685f7fbafc69ea560
-
SHA1
a19263fefcd364e9665b9c88dd72564b5baafb58
-
SHA256
e83171163f224c95d852ab0aeb24d153dc1c12ed413cf0790184d12cb2e277ac
-
SHA512
68adb6c3adbb2254a6b2a0dd0fc8e6af96bdb0c0a1b17cd66f42ba7e4fba87ff59d7de61c7a1cc75e12380c4ff63e385921a49c824a6b19c83af81ad5a5cad3d
-
SSDEEP
3072:vVi2i09Re4EBfHt7O04w6PQnLKaNg4OeWmQS20mU/WW:2064KFO04QnLNQe2N0m2x
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4692 wrote to memory of 4280 4692 rundll32.exe 84 PID 4692 wrote to memory of 4280 4692 rundll32.exe 84 PID 4692 wrote to memory of 4280 4692 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e83171163f224c95d852ab0aeb24d153dc1c12ed413cf0790184d12cb2e277ac.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e83171163f224c95d852ab0aeb24d153dc1c12ed413cf0790184d12cb2e277ac.dll,#12⤵PID:4280
-