Analysis
-
max time kernel
163s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 00:28
Behavioral task
behavioral1
Sample
e524986178e1031a9c12e87505a2fe2a9151e1b7463a0321810911c9c408debb.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
e524986178e1031a9c12e87505a2fe2a9151e1b7463a0321810911c9c408debb.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
e524986178e1031a9c12e87505a2fe2a9151e1b7463a0321810911c9c408debb.dll
-
Size
52KB
-
MD5
3d2a70b921ed15d605dd6d01125397f0
-
SHA1
b867c00ba21c71f214d8ee0ccb3993d0bafd758b
-
SHA256
e524986178e1031a9c12e87505a2fe2a9151e1b7463a0321810911c9c408debb
-
SHA512
2500c55b47de05a7082ebf7e0769eea113db88d6e22e262e1230be35f2fb902117407e3260a116a675d5ab2ee56a9e8291977dedb6d200fc71d140f074c4d408
-
SSDEEP
768:eGJWjQVmle9XAgBoq8JPPbabrztFI3w4m7PJYHFZNbzWYMI1msSQNVczyLeN5g:esWj3lpi8av5EcOZNqY3FNVrKq
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4648 4660 rundll32.exe 40 PID 4660 wrote to memory of 4648 4660 rundll32.exe 40 PID 4660 wrote to memory of 4648 4660 rundll32.exe 40
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e524986178e1031a9c12e87505a2fe2a9151e1b7463a0321810911c9c408debb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e524986178e1031a9c12e87505a2fe2a9151e1b7463a0321810911c9c408debb.dll,#12⤵PID:4648
-