Analysis
-
max time kernel
256s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 13:01
Static task
static1
Behavioral task
behavioral1
Sample
e806038dd56139877bb98241123cdb1974d4f238688540b8eb8ca20e28fa9ae2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e806038dd56139877bb98241123cdb1974d4f238688540b8eb8ca20e28fa9ae2.dll
Resource
win10v2004-20221111-en
General
-
Target
e806038dd56139877bb98241123cdb1974d4f238688540b8eb8ca20e28fa9ae2.dll
-
Size
659KB
-
MD5
864b174230ba37d1881d12cc517ebe1a
-
SHA1
e61cac53f9899b65a14df097e4b37a2bde135b6d
-
SHA256
e806038dd56139877bb98241123cdb1974d4f238688540b8eb8ca20e28fa9ae2
-
SHA512
cb98c6e3a9898d3f1ecd2b6a1cbdcbd4bf90a6bbf33ed1d411c332d2b4f353ecd566c3864f94f68301f5914e19b6e3e77115f0fdbca4e6becd2f52122ff08d95
-
SSDEEP
12288:cwgqzbpfxy1iuCRXeoOoAHmwal4qsVo6QKQT98B5iYH:9nbpE1weoOoA6z0o64T9y5nH
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4632 4716 rundll32.exe 82 PID 4716 wrote to memory of 4632 4716 rundll32.exe 82 PID 4716 wrote to memory of 4632 4716 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e806038dd56139877bb98241123cdb1974d4f238688540b8eb8ca20e28fa9ae2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e806038dd56139877bb98241123cdb1974d4f238688540b8eb8ca20e28fa9ae2.dll,#12⤵PID:4632
-