Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
eb4aea7fdfe0bc36d556eb6c6040e185f7ae9b4d373ad66cbd9bc6a77e4d7f31.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb4aea7fdfe0bc36d556eb6c6040e185f7ae9b4d373ad66cbd9bc6a77e4d7f31.dll
Resource
win10v2004-20220812-en
General
-
Target
eb4aea7fdfe0bc36d556eb6c6040e185f7ae9b4d373ad66cbd9bc6a77e4d7f31.dll
-
Size
4KB
-
MD5
24aec596e842f9f033c573a35702a700
-
SHA1
0ac410e51291a4c4e4793e5b1db3e3a7ba692dca
-
SHA256
eb4aea7fdfe0bc36d556eb6c6040e185f7ae9b4d373ad66cbd9bc6a77e4d7f31
-
SHA512
134f6f6b11402dcdf4d71e8ad53c3e6844da1d0def9d879015f6d0b024d4605e50e7db7defa3e3a7cbeb0735ebf0a2f82ca84f4154aee92d8214ed987654ae21
-
SSDEEP
48:q0Z48j1gA5YHofrhWR0/iIsipbYtDfXgOrnsB/S+0cmXrCxTA6/SS:1tRn5cofrY06I/VY1no0VEA6/T
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4776 wrote to memory of 832 4776 rundll32.exe 83 PID 4776 wrote to memory of 832 4776 rundll32.exe 83 PID 4776 wrote to memory of 832 4776 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb4aea7fdfe0bc36d556eb6c6040e185f7ae9b4d373ad66cbd9bc6a77e4d7f31.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb4aea7fdfe0bc36d556eb6c6040e185f7ae9b4d373ad66cbd9bc6a77e4d7f31.dll,#12⤵PID:832
-