Analysis
-
max time kernel
32s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49.dll
Resource
win10v2004-20221111-en
General
-
Target
ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49.dll
-
Size
304KB
-
MD5
32bc3b3a646e6b26957d5e9711731560
-
SHA1
c78a481ba9738d340240e9486e6a0191de5c3688
-
SHA256
ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49
-
SHA512
017fd28217b127f2e1a2495c2b62f458ce233ec121d3ad4ac8eea420cf65c31fae7679e19751f7f73fbd3b8160156d8b3727ec10f6b4f4eb167ab10b90472925
-
SSDEEP
3072:AmiT/Dtir5aSd/D89NUq0yAh195CAbNjMoXN3FQLibzdT6pj2joI+c3ChPNtWsGq:MT/AuNUuAFsojMAFLQhPWs0zY
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1892-56-0x0000000000130000-0x000000000013E000-memory.dmp upx behavioral1/memory/1892-59-0x0000000000130000-0x000000000013E000-memory.dmp upx behavioral1/memory/1892-60-0x0000000000130000-0x000000000013E000-memory.dmp upx behavioral1/memory/1892-61-0x0000000000130000-0x000000000013E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1892 1160 rundll32.exe 26 PID 1160 wrote to memory of 1892 1160 rundll32.exe 26 PID 1160 wrote to memory of 1892 1160 rundll32.exe 26 PID 1160 wrote to memory of 1892 1160 rundll32.exe 26 PID 1160 wrote to memory of 1892 1160 rundll32.exe 26 PID 1160 wrote to memory of 1892 1160 rundll32.exe 26 PID 1160 wrote to memory of 1892 1160 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49.dll,#12⤵PID:1892
-