Analysis
-
max time kernel
255s -
max time network
309s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 17:47
Behavioral task
behavioral1
Sample
eccf40d787b9dd9368a1e5159a76411bcdd4dcfffc45f36a2fdab0511f060fe2.dll
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
eccf40d787b9dd9368a1e5159a76411bcdd4dcfffc45f36a2fdab0511f060fe2.dll
Resource
win10v2004-20221111-en
2 signatures
150 seconds
General
-
Target
eccf40d787b9dd9368a1e5159a76411bcdd4dcfffc45f36a2fdab0511f060fe2.dll
-
Size
239KB
-
MD5
91739edb4d6200f40dc165648427a1c8
-
SHA1
51d4eeae48f571060206abb73ed6530e750620e3
-
SHA256
eccf40d787b9dd9368a1e5159a76411bcdd4dcfffc45f36a2fdab0511f060fe2
-
SHA512
2a608f19e19467ef3e3c397000b32d41b55aede5133e81d7da44d8d772aafd03d4f849a9729dad7d8a4c784972c2c65d818ddf4d573e4bdf98a56eb3f6dd507a
-
SSDEEP
6144:zkXhFLogaVbJRdgHgnuoE681zPHM/4/3S7o:zQLogalJRdgHZoEXRs/4v+o
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4012-133-0x0000000074ED0000-0x0000000074F1E000-memory.dmp upx behavioral2/memory/4012-134-0x0000000074ED0000-0x0000000074F1E000-memory.dmp upx behavioral2/memory/4012-135-0x0000000074ED0000-0x0000000074F1E000-memory.dmp upx behavioral2/memory/4012-136-0x0000000074ED0000-0x0000000074F1E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2360 wrote to memory of 4012 2360 rundll32.exe 82 PID 2360 wrote to memory of 4012 2360 rundll32.exe 82 PID 2360 wrote to memory of 4012 2360 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eccf40d787b9dd9368a1e5159a76411bcdd4dcfffc45f36a2fdab0511f060fe2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eccf40d787b9dd9368a1e5159a76411bcdd4dcfffc45f36a2fdab0511f060fe2.dll,#12⤵PID:4012
-