Analysis
-
max time kernel
227s -
max time network
282s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
eb051dd441f5218f84e338bcdacfbb057aaed7dc4860cf3a8e55e50998b8ac25.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb051dd441f5218f84e338bcdacfbb057aaed7dc4860cf3a8e55e50998b8ac25.dll
Resource
win10v2004-20221111-en
General
-
Target
eb051dd441f5218f84e338bcdacfbb057aaed7dc4860cf3a8e55e50998b8ac25.dll
-
Size
4KB
-
MD5
752585cd0eb113fa9c03d8408b98aca0
-
SHA1
ed5fffe243fafc245e2d9e0e7c100860c76ef32e
-
SHA256
eb051dd441f5218f84e338bcdacfbb057aaed7dc4860cf3a8e55e50998b8ac25
-
SHA512
beee04516bfa4e5f75f33baf5ffc8db28f225904bdc54e86c70586b19994873577de5de64f9941478a0d994c78878cb306ae578ec02680f6c34e74f66957849c
-
SSDEEP
48:iMHGv8j2IcW89NYEArhWHR0MiiIsiI6lXVkqlcH2SuiS6o+mm9T2l4RG:PmkiIz8UZrQ0MhI/ITqly9T2WG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2700 1060 rundll32.exe 82 PID 1060 wrote to memory of 2700 1060 rundll32.exe 82 PID 1060 wrote to memory of 2700 1060 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb051dd441f5218f84e338bcdacfbb057aaed7dc4860cf3a8e55e50998b8ac25.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb051dd441f5218f84e338bcdacfbb057aaed7dc4860cf3a8e55e50998b8ac25.dll,#12⤵PID:2700
-