Analysis
-
max time kernel
90s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2022, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
ee85ababc8769dc05ea7f0a14d38257d5fb97487e15084ce4ef91fcdbf0425d0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee85ababc8769dc05ea7f0a14d38257d5fb97487e15084ce4ef91fcdbf0425d0.dll
Resource
win10v2004-20220901-en
General
-
Target
ee85ababc8769dc05ea7f0a14d38257d5fb97487e15084ce4ef91fcdbf0425d0.dll
-
Size
64KB
-
MD5
36d2ee4919663ac77f2d44b0c5c9cc24
-
SHA1
0d6e3f7b35f61cad154289459cf7ad260c04ba60
-
SHA256
ee85ababc8769dc05ea7f0a14d38257d5fb97487e15084ce4ef91fcdbf0425d0
-
SHA512
ace59fde04a4f0dd77f4057a0a98213fe0043a63647672cb66a940bc4ce67e95d18754c193b4443c28713158393795c7a3a91cfd9e2a7d09181eb1109771bf04
-
SSDEEP
768:HeS4FuWdMqy7PcGt/j2CnpTGyvK8kob6R8kUvyNVgmFj9o9ZifHp0u:v4UWGqoPcGtj2CpyySS9kUvyP17o4Jp
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4932 4864 rundll32.exe 81 PID 4864 wrote to memory of 4932 4864 rundll32.exe 81 PID 4864 wrote to memory of 4932 4864 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee85ababc8769dc05ea7f0a14d38257d5fb97487e15084ce4ef91fcdbf0425d0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee85ababc8769dc05ea7f0a14d38257d5fb97487e15084ce4ef91fcdbf0425d0.dll,#12⤵PID:4932
-