Analysis
-
max time kernel
300s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-es -
resource tags
arch:x64arch:x86image:win10v2004-20240709-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
16/07/2024, 11:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e89614e3b0430d706bef2d1f13b30b43e5c53db9a477e2ff60ef5464e1e9add4.dll
Resource
win7-20240704-es
2 signatures
300 seconds
Behavioral task
behavioral2
Sample
e89614e3b0430d706bef2d1f13b30b43e5c53db9a477e2ff60ef5464e1e9add4.dll
Resource
win10v2004-20240709-es
2 signatures
300 seconds
General
-
Target
e89614e3b0430d706bef2d1f13b30b43e5c53db9a477e2ff60ef5464e1e9add4.dll
-
Size
116KB
-
MD5
9f9723c5ff4ec1b7f08eb2005632b8b1
-
SHA1
e47a821ef85d722f01f10adff227f45552e4ec73
-
SHA256
e89614e3b0430d706bef2d1f13b30b43e5c53db9a477e2ff60ef5464e1e9add4
-
SHA512
3f222302d039337493736cd865c4b7c91d9a064b0ca68a7f3254bf0f35d4abc69da7f89096a3333e527730b81f142b3b608ee3313e050c061c11c14c7261f8d0
-
SSDEEP
3072:Z3EKsekGvHowEu//WfW0JTtLVbZDe6n7KSNM:REKsekco0/2WEgCu/
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 4176 rundll32.exe 38 4176 rundll32.exe 41 4176 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4176 2160 rundll32.exe 83 PID 2160 wrote to memory of 4176 2160 rundll32.exe 83 PID 2160 wrote to memory of 4176 2160 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e89614e3b0430d706bef2d1f13b30b43e5c53db9a477e2ff60ef5464e1e9add4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e89614e3b0430d706bef2d1f13b30b43e5c53db9a477e2ff60ef5464e1e9add4.dll,#12⤵
- Blocklisted process makes network request
PID:4176
-