Analysis
-
max time kernel
186s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49.dll
Resource
win10v2004-20221111-en
General
-
Target
ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49.dll
-
Size
304KB
-
MD5
32bc3b3a646e6b26957d5e9711731560
-
SHA1
c78a481ba9738d340240e9486e6a0191de5c3688
-
SHA256
ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49
-
SHA512
017fd28217b127f2e1a2495c2b62f458ce233ec121d3ad4ac8eea420cf65c31fae7679e19751f7f73fbd3b8160156d8b3727ec10f6b4f4eb167ab10b90472925
-
SSDEEP
3072:AmiT/Dtir5aSd/D89NUq0yAh195CAbNjMoXN3FQLibzdT6pj2joI+c3ChPNtWsGq:MT/AuNUuAFsojMAFLQhPWs0zY
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4568-133-0x0000000000990000-0x000000000099E000-memory.dmp upx behavioral2/memory/4568-136-0x0000000000990000-0x000000000099E000-memory.dmp upx behavioral2/memory/4568-137-0x0000000000990000-0x000000000099E000-memory.dmp upx behavioral2/memory/4568-138-0x0000000000990000-0x00000000009A0000-memory.dmp upx behavioral2/memory/4568-142-0x0000000000990000-0x000000000099E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4568 5040 rundll32.exe 82 PID 5040 wrote to memory of 4568 5040 rundll32.exe 82 PID 5040 wrote to memory of 4568 5040 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea3ce7157ac8a6d09c6b9a8e0064ff607983f268853a4883ba8d7dae824b7d49.dll,#12⤵PID:4568
-