Analysis
-
max time kernel
174s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
e2f5e6b61026dd64b279d9d1055c26cff6710aeeb088786a358410ea8066e0ea.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2f5e6b61026dd64b279d9d1055c26cff6710aeeb088786a358410ea8066e0ea.dll
Resource
win10v2004-20220812-en
General
-
Target
e2f5e6b61026dd64b279d9d1055c26cff6710aeeb088786a358410ea8066e0ea.dll
-
Size
92KB
-
MD5
8fd83ddee1958cb80e80b514ff02666c
-
SHA1
7c221bcb848325cdcdc2191e7051cf63555cde12
-
SHA256
e2f5e6b61026dd64b279d9d1055c26cff6710aeeb088786a358410ea8066e0ea
-
SHA512
e7146ea9014149e640e6c64ee5fb4f10696ca06008e62285925be78f8edc9a1148bee00ca6771cab08afea51a2baccd438230ed353abb9c6a259b3a2430ffcb1
-
SSDEEP
1536:sSq5+UQ6wkCfI90KTcxiVNLlwI9QmZ5Jlc7Vhnb+zwKAIRYEHtKHCmFCQuY6+9:w+UfwJTsZVJ6I9QmZ5JlcBhnb+zwDIGb
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3564 wrote to memory of 4964 3564 rundll32.exe 81 PID 3564 wrote to memory of 4964 3564 rundll32.exe 81 PID 3564 wrote to memory of 4964 3564 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2f5e6b61026dd64b279d9d1055c26cff6710aeeb088786a358410ea8066e0ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2f5e6b61026dd64b279d9d1055c26cff6710aeeb088786a358410ea8066e0ea.dll,#12⤵PID:4964
-