Analysis
-
max time kernel
213s -
max time network
287s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 20:18
Behavioral task
behavioral1
Sample
ee47390ec2202e5647e6a68b188a6cbd470af5dd896a79b1e3bee81f3ce98496.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ee47390ec2202e5647e6a68b188a6cbd470af5dd896a79b1e3bee81f3ce98496.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
ee47390ec2202e5647e6a68b188a6cbd470af5dd896a79b1e3bee81f3ce98496.dll
-
Size
95KB
-
MD5
389fe37eca0a46c159d909aa345735ce
-
SHA1
9e61a4b0f70f84f038bda30bd973e4fee2928dd3
-
SHA256
ee47390ec2202e5647e6a68b188a6cbd470af5dd896a79b1e3bee81f3ce98496
-
SHA512
73ae8c992ea7f4c5372f32023a4a338a8467d22c20adc795845e13ab3bce42d54b82ec4660c08181edc4a349ca2f6f233d4276ed399c564162f20d87b7f0e292
-
SSDEEP
1536:aI9js9B05V54quaKUiyTmfFI5fZGJ0ObmmB2Rn2+TPKUvHZOxlk:Xjs9B6A+iNC5ASOZ0nX5Wk
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4320 4920 rundll32.exe 80 PID 4920 wrote to memory of 4320 4920 rundll32.exe 80 PID 4920 wrote to memory of 4320 4920 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee47390ec2202e5647e6a68b188a6cbd470af5dd896a79b1e3bee81f3ce98496.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee47390ec2202e5647e6a68b188a6cbd470af5dd896a79b1e3bee81f3ce98496.dll,#12⤵PID:4320
-