Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
e30020e0a30fa34375e5e86a79b878a9eb7cd12765f9978c00431c6406e2081c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e30020e0a30fa34375e5e86a79b878a9eb7cd12765f9978c00431c6406e2081c.dll
Resource
win10v2004-20240226-en
General
-
Target
e30020e0a30fa34375e5e86a79b878a9eb7cd12765f9978c00431c6406e2081c.dll
-
Size
342KB
-
MD5
c654755295c8c8356d88ec1e907b2494
-
SHA1
cba8d1dfd7f2ad3bbdd3340ecbf290dca675baa0
-
SHA256
e30020e0a30fa34375e5e86a79b878a9eb7cd12765f9978c00431c6406e2081c
-
SHA512
a31c0c20b7fc5b7574b7a0e0196809ca802995ab42717ff052a3ffc1fdfe04c5277f97990a6e70c0263c0e0bedd94ee34b6e695be6b213d01825a2e323fed7ac
-
SSDEEP
6144:YRoOpXN8bEvZehNyi5qlscXsKCkSLjn7WQDilmvWpJJvEiS:YRoOpXCjNwlscXeJikilmvYEiS
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1696 wrote to memory of 4044 1696 rundll32.exe 86 PID 1696 wrote to memory of 4044 1696 rundll32.exe 86 PID 1696 wrote to memory of 4044 1696 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e30020e0a30fa34375e5e86a79b878a9eb7cd12765f9978c00431c6406e2081c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e30020e0a30fa34375e5e86a79b878a9eb7cd12765f9978c00431c6406e2081c.dll,#12⤵PID:4044
-