Analysis
-
max time kernel
106s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 04:32
Static task
static1
Behavioral task
behavioral1
Sample
ea382933d1a936b64d2f5d9f0acaa634c3c2986ae1b8faf9894fe83847a85973.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ea382933d1a936b64d2f5d9f0acaa634c3c2986ae1b8faf9894fe83847a85973.dll
Resource
win10v2004-20220901-en
General
-
Target
ea382933d1a936b64d2f5d9f0acaa634c3c2986ae1b8faf9894fe83847a85973.dll
-
Size
242KB
-
MD5
0931a7ece8e4658fe27a736043ba7f20
-
SHA1
468dfb496857bd1fc9e7bfe86566ab3d1ac8f2be
-
SHA256
ea382933d1a936b64d2f5d9f0acaa634c3c2986ae1b8faf9894fe83847a85973
-
SHA512
b7907c1dbcee0e30f0247c306bea862bdfddcf99f6d43a3ff4c9a90edab5ed509268494c42de26a9b067150c28e7ab0593b8b82bd91aeae5fa249244c79a09d3
-
SSDEEP
3072:QoyxvfGCX2tMY/jgAg2qvCPdrqnS2zT4sPLc9Uq1ul5Crc:QoQfL6MAgjbT4uc97Q
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1580 2224 rundll32.exe 51 PID 2224 wrote to memory of 1580 2224 rundll32.exe 51 PID 2224 wrote to memory of 1580 2224 rundll32.exe 51
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea382933d1a936b64d2f5d9f0acaa634c3c2986ae1b8faf9894fe83847a85973.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea382933d1a936b64d2f5d9f0acaa634c3c2986ae1b8faf9894fe83847a85973.dll,#12⤵PID:1580
-