Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 23:49
Static task
static1
Behavioral task
behavioral1
Sample
eb0ae36db26ef27935af4caa9aa96bc78d3bd827c88e5d1ce4f59284b15d445a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb0ae36db26ef27935af4caa9aa96bc78d3bd827c88e5d1ce4f59284b15d445a.dll
Resource
win10v2004-20220901-en
General
-
Target
eb0ae36db26ef27935af4caa9aa96bc78d3bd827c88e5d1ce4f59284b15d445a.dll
-
Size
100KB
-
MD5
73db505bc75ec800ed4bdbe681083f14
-
SHA1
ff24de9866024a334471f32344245c98478e8b01
-
SHA256
eb0ae36db26ef27935af4caa9aa96bc78d3bd827c88e5d1ce4f59284b15d445a
-
SHA512
16e63c3232f7fd8005f768ef91d8740a3ea123170765de899f7a778d095b8091c18bd7011cb22a17eeace3b274644979176834ee7a262da388309dfa6e8d3b48
-
SSDEEP
768:CWsPpPZ8sAHzNCf80Q9UFUHPk2feF5oZ0ZTPKvfoFyC815Ti7a3v6poLGJk4+qBx:ChkNxYU5C2vwCHieC6wNlopa04Vxj
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4540 4964 rundll32.exe 82 PID 4964 wrote to memory of 4540 4964 rundll32.exe 82 PID 4964 wrote to memory of 4540 4964 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb0ae36db26ef27935af4caa9aa96bc78d3bd827c88e5d1ce4f59284b15d445a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb0ae36db26ef27935af4caa9aa96bc78d3bd827c88e5d1ce4f59284b15d445a.dll,#12⤵PID:4540
-