Analysis
-
max time kernel
147s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
ae5e6a0699475f5c2a1d8cb888a6e683303afce183648945ccadbb6850a835aa.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ae5e6a0699475f5c2a1d8cb888a6e683303afce183648945ccadbb6850a835aa.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
ae5e6a0699475f5c2a1d8cb888a6e683303afce183648945ccadbb6850a835aa.dll
-
Size
3KB
-
MD5
3233f17cbff2fb50ac0ba4dcaf089200
-
SHA1
9f3e641a8e1f02ac20fb9249a7e658d8d05c2f99
-
SHA256
ae5e6a0699475f5c2a1d8cb888a6e683303afce183648945ccadbb6850a835aa
-
SHA512
184bb1b5f7fdbbb9c78ba9be0e87d5d134318fb12172f3e5c9633df7b8d66dcaf8fe8dfb5ee6d69c5681fb6967f205d67b5a1a547cb68f07136596089aebb83e
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1948 wrote to memory of 4028 1948 rundll32.exe 80 PID 1948 wrote to memory of 4028 1948 rundll32.exe 80 PID 1948 wrote to memory of 4028 1948 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae5e6a0699475f5c2a1d8cb888a6e683303afce183648945ccadbb6850a835aa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae5e6a0699475f5c2a1d8cb888a6e683303afce183648945ccadbb6850a835aa.dll,#12⤵PID:4028
-