Analysis
-
max time kernel
192s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
e030eb5e5da4f601f299c248db58ffec913d4d4661f1c0279a5136682c147231.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e030eb5e5da4f601f299c248db58ffec913d4d4661f1c0279a5136682c147231.dll
Resource
win10v2004-20221111-en
General
-
Target
e030eb5e5da4f601f299c248db58ffec913d4d4661f1c0279a5136682c147231.dll
-
Size
8KB
-
MD5
1f7c53b1cc4654c30a47347860fe93c0
-
SHA1
9973e72967c1855d614abb790b5681e13462133d
-
SHA256
e030eb5e5da4f601f299c248db58ffec913d4d4661f1c0279a5136682c147231
-
SHA512
98105e0c38eff6d571e818336e10df0e055851b3c3f31a1baf6116e2f98607966de6c1bd6ff811ae4f4f88bfe1a4e7e907078694357e1fc95ddca86fc226c80a
-
SSDEEP
192:nGTWJGp0UZUd6378snt79oCBUdyS0eMrizK/mey:nGTWbUZku8st79oCBUdy0Mrizmmey
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4292 3080 rundll32.exe 82 PID 3080 wrote to memory of 4292 3080 rundll32.exe 82 PID 3080 wrote to memory of 4292 3080 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e030eb5e5da4f601f299c248db58ffec913d4d4661f1c0279a5136682c147231.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e030eb5e5da4f601f299c248db58ffec913d4d4661f1c0279a5136682c147231.dll,#12⤵PID:4292
-