Analysis
-
max time kernel
130s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
e3cc7b0f5b292cc98ed15835a57568186b68422ff44089f25bca02155017f287.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e3cc7b0f5b292cc98ed15835a57568186b68422ff44089f25bca02155017f287.dll
Resource
win10v2004-20240426-en
General
-
Target
e3cc7b0f5b292cc98ed15835a57568186b68422ff44089f25bca02155017f287.dll
-
Size
327KB
-
MD5
d12cb1723e3871d9bf8010a751259ddc
-
SHA1
79eb3be8eb3dfd9f9156c34669222ecdd0ff33c6
-
SHA256
e3cc7b0f5b292cc98ed15835a57568186b68422ff44089f25bca02155017f287
-
SHA512
f868a6f868f1c41faff0a8fd0d5c288cff225b624eaba2c22f319c3c7ba120a7f8d767c8bda781b3e4d62f60fd44a872f5e8058b52fd0c9c4818b392e7481596
-
SSDEEP
6144:EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC48Ss9Ei:EmWhND9yJz+b1FcMLmp2AT8Ssd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1528 2344 rundll32.exe 82 PID 2344 wrote to memory of 1528 2344 rundll32.exe 82 PID 2344 wrote to memory of 1528 2344 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3cc7b0f5b292cc98ed15835a57568186b68422ff44089f25bca02155017f287.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3cc7b0f5b292cc98ed15835a57568186b68422ff44089f25bca02155017f287.dll,#12⤵PID:1528
-