Analysis
-
max time kernel
41s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 13:32
Behavioral task
behavioral1
Sample
e3c4cd2512acd3db1fbf001e740badc76fc8d60f90db30c1ce930d17a1935257.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
e3c4cd2512acd3db1fbf001e740badc76fc8d60f90db30c1ce930d17a1935257.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
e3c4cd2512acd3db1fbf001e740badc76fc8d60f90db30c1ce930d17a1935257.dll
-
Size
76KB
-
MD5
57b967a28928aedd6860e743458fa974
-
SHA1
0c990cca8fd03ffbb71c0aab63b6c58ba4a4a393
-
SHA256
e3c4cd2512acd3db1fbf001e740badc76fc8d60f90db30c1ce930d17a1935257
-
SHA512
67a99f38006123d2b7ffc665d7101599ddbebb630c13f64dcf260c5153934d8b0827d0f8df8304ee82c7a84ee2b1b971a3e495dee88db96bdf364abf7c5ebe99
-
SSDEEP
1536:C4Qpe2e5+ZIUis6Gzc0KaU4M1xaNNtNMvAzCY5Yy13GQ6tHD9ABAHWb8A:1QM2I+ZIUi/GzVjU4Kx+dDqy5ax46ef
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1304 wrote to memory of 692 1304 rundll32.exe 28 PID 1304 wrote to memory of 692 1304 rundll32.exe 28 PID 1304 wrote to memory of 692 1304 rundll32.exe 28 PID 1304 wrote to memory of 692 1304 rundll32.exe 28 PID 1304 wrote to memory of 692 1304 rundll32.exe 28 PID 1304 wrote to memory of 692 1304 rundll32.exe 28 PID 1304 wrote to memory of 692 1304 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3c4cd2512acd3db1fbf001e740badc76fc8d60f90db30c1ce930d17a1935257.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3c4cd2512acd3db1fbf001e740badc76fc8d60f90db30c1ce930d17a1935257.dll,#12⤵PID:692
-