Analysis
-
max time kernel
183s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 05:13
Static task
static1
Behavioral task
behavioral1
Sample
iejyioxs.dll
Resource
win7-20220715-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
iejyioxs.dll
Resource
win10v2004-20220721-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
iejyioxs.dll
-
Size
348KB
-
MD5
dca3f0a3eecf16ac4b72615d712112e9
-
SHA1
909870e8ea76626fbe13e2c960560c2a165bd102
-
SHA256
b5abacf24ae5aa96016c09f71a78d0121fff396d6154740eab622c4751e1764f
-
SHA512
4bb8558e76f78b1078526952420789552930119fff8a8163d86e809186bcc7f2d2b78ee1475bc2d143648a1e890da841f0dd24704a3a1b93783b686cd95dd510
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 36 4616 rundll32.exe 43 4616 rundll32.exe 47 4616 rundll32.exe 55 4616 rundll32.exe 70 4616 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe 4616 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4616 4660 rundll32.exe 82 PID 4660 wrote to memory of 4616 4660 rundll32.exe 82 PID 4660 wrote to memory of 4616 4660 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\iejyioxs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\iejyioxs.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4616
-