Analysis
-
max time kernel
175s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 17:17
Static task
static1
Behavioral task
behavioral1
Sample
e70aafcad03af934cd709c97054532e935f12ded13b12f9dcff775be9f119d4c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e70aafcad03af934cd709c97054532e935f12ded13b12f9dcff775be9f119d4c.dll
Resource
win10v2004-20221111-en
General
-
Target
e70aafcad03af934cd709c97054532e935f12ded13b12f9dcff775be9f119d4c.dll
-
Size
18KB
-
MD5
3ecb2a28a50410056f7ee83f3c5f0c60
-
SHA1
d6f4aff5c5965df71158b664b54373bb96fb7238
-
SHA256
e70aafcad03af934cd709c97054532e935f12ded13b12f9dcff775be9f119d4c
-
SHA512
4a13ae8e59ad4edd5cf56d3d2bc06e23390e5d089f49257d888efb86fba975669ccca125efaa9024700e5d5f1c49348e843c0bcad40326214ab6e17c1ddec4fe
-
SSDEEP
384:JlCiGC+GoC37M6F0yWqYkD68P81+AeCTQ760viTUY:JMiO27MUWXkv81+AeCTQ7Xv6j
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 3524 1944 rundll32.exe 82 PID 1944 wrote to memory of 3524 1944 rundll32.exe 82 PID 1944 wrote to memory of 3524 1944 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e70aafcad03af934cd709c97054532e935f12ded13b12f9dcff775be9f119d4c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e70aafcad03af934cd709c97054532e935f12ded13b12f9dcff775be9f119d4c.dll,#12⤵PID:3524
-