Analysis
-
max time kernel
27s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:41
Static task
static1
Behavioral task
behavioral1
Sample
e1f0f32eea2e53a82fd3bfcd2373ae6b1b625d917613706c7a75e406c3feb02c.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
e1f0f32eea2e53a82fd3bfcd2373ae6b1b625d917613706c7a75e406c3feb02c.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
e1f0f32eea2e53a82fd3bfcd2373ae6b1b625d917613706c7a75e406c3feb02c.dll
-
Size
5KB
-
MD5
3e1c7f67ed90e4f7f7f906ea0ff0c520
-
SHA1
0611d90da98184c625d82c9c560e93b1085f5384
-
SHA256
e1f0f32eea2e53a82fd3bfcd2373ae6b1b625d917613706c7a75e406c3feb02c
-
SHA512
a37926050231d248cda99692d4501b597a1d1abb851a2eae020b76f5df2409bd970b6361f32b9b48cb1b088b8b225f48f94b8f46ab23b6996ad6a5737857235b
-
SSDEEP
96:nEY2RrF1eqwi4SUSsvJgUJ2AFKzcYYSj/:EHRh1epp/SAJgv22cq/
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2036 2024 rundll32.exe 28 PID 2024 wrote to memory of 2036 2024 rundll32.exe 28 PID 2024 wrote to memory of 2036 2024 rundll32.exe 28 PID 2024 wrote to memory of 2036 2024 rundll32.exe 28 PID 2024 wrote to memory of 2036 2024 rundll32.exe 28 PID 2024 wrote to memory of 2036 2024 rundll32.exe 28 PID 2024 wrote to memory of 2036 2024 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1f0f32eea2e53a82fd3bfcd2373ae6b1b625d917613706c7a75e406c3feb02c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1f0f32eea2e53a82fd3bfcd2373ae6b1b625d917613706c7a75e406c3feb02c.dll,#12⤵PID:2036
-