Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
ea00ef8df49252f8ef6fba5e90f9bcad808fd84ddbba0112e13e84e1d61d40a6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea00ef8df49252f8ef6fba5e90f9bcad808fd84ddbba0112e13e84e1d61d40a6.dll
Resource
win10v2004-20220812-en
General
-
Target
ea00ef8df49252f8ef6fba5e90f9bcad808fd84ddbba0112e13e84e1d61d40a6.dll
-
Size
152KB
-
MD5
b1bb4cdb34c1d6298290ba576704042f
-
SHA1
1aba9ee0e1c07d9d1924c72864ce5e4532716aa4
-
SHA256
ea00ef8df49252f8ef6fba5e90f9bcad808fd84ddbba0112e13e84e1d61d40a6
-
SHA512
5e344e812f28e2a4ea79ced69148828d15ddfcd49b5177172a404781d3b78c850bb73a1df234db83da978b0a3dd1d365de5a583b473c528c4d43bd519c870cbc
-
SSDEEP
1536:IJJt2XdgoEvYtSinyBNvTZpYk5ik4b5JjincicYFRzFzecxomubZ2iparjLADnDn:I9ydgoEvffwei30F7e/bZKAn9tAa
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5108 wrote to memory of 900 5108 rundll32.exe 79 PID 5108 wrote to memory of 900 5108 rundll32.exe 79 PID 5108 wrote to memory of 900 5108 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea00ef8df49252f8ef6fba5e90f9bcad808fd84ddbba0112e13e84e1d61d40a6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea00ef8df49252f8ef6fba5e90f9bcad808fd84ddbba0112e13e84e1d61d40a6.dll,#12⤵PID:900
-