Analysis
-
max time kernel
74s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
e26f5e7a3defced4369bd4bc4699e25baa978a63686a2ae9075404a713932fba.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
e26f5e7a3defced4369bd4bc4699e25baa978a63686a2ae9075404a713932fba.dll
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
e26f5e7a3defced4369bd4bc4699e25baa978a63686a2ae9075404a713932fba.dll
-
Size
5KB
-
MD5
8db69522b86cee58f05c25cd72d19ca0
-
SHA1
d357c4bbbd4ae34781a62acd4b31bc804bc4f90f
-
SHA256
e26f5e7a3defced4369bd4bc4699e25baa978a63686a2ae9075404a713932fba
-
SHA512
10adc19fe941baa6f5e3b9c9a4a3386f3c3597088cef5bcf09b7b3e6108c8492be7c57fb703dee423f7277e30dd5adc7f371fa2c228c850152da32bc5c5c61cb
-
SSDEEP
96:nI2RrUeqXmMGS7p51Fp/88L8ObVJ917ue5g:XR4eMfGOPRbhtxg
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4996 wrote to memory of 4248 4996 rundll32.exe 38 PID 4996 wrote to memory of 4248 4996 rundll32.exe 38 PID 4996 wrote to memory of 4248 4996 rundll32.exe 38
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e26f5e7a3defced4369bd4bc4699e25baa978a63686a2ae9075404a713932fba.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e26f5e7a3defced4369bd4bc4699e25baa978a63686a2ae9075404a713932fba.dll,#12⤵PID:4248
-