Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 11:31
Behavioral task
behavioral1
Sample
e1900e1e64c730073c74c7bd72ef8f3e.dll
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
e1900e1e64c730073c74c7bd72ef8f3e.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
e1900e1e64c730073c74c7bd72ef8f3e.dll
-
Size
176KB
-
MD5
e1900e1e64c730073c74c7bd72ef8f3e
-
SHA1
f2a2faf02d532bf9f2c209d349c580f4525ad19a
-
SHA256
b792a3a2b46072f6c0ef11cc0e0b4366af25a4a43e5a94476b6e387e765a1e25
-
SHA512
9256d304e6cfb52a070276d026eb86eec713fa6054092e9d977a5b734f240cc8d767f7f1117347fe4c50f516736339e34839d7614fd603eef4d4a797e1cd0722
-
SSDEEP
3072:Kt5X/FnNDIwTweBhNZAxdJIeQ7hqrw1o98PsMBv3MCmJpJTJOO:Kth9DfKx/8GcsMBvMCmJppIO
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\aspr_keys.ini rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1792 2680 rundll32.exe 84 PID 2680 wrote to memory of 1792 2680 rundll32.exe 84 PID 2680 wrote to memory of 1792 2680 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1900e1e64c730073c74c7bd72ef8f3e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1900e1e64c730073c74c7bd72ef8f3e.dll,#12⤵
- Drops file in System32 directory
PID:1792
-