Analysis
-
max time kernel
14s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2.dll
Resource
win10v2004-20220812-en
General
-
Target
ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2.dll
-
Size
208KB
-
MD5
099e73bd7633662bff63cc19f0e14090
-
SHA1
87f3056b2942d5f9ee05190ca41a3b711ea0bab8
-
SHA256
ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2
-
SHA512
1095ecc50aee49e0915475cad1349477ef322718a5c8692bcd8b9ecec79df49a632e34ea6abe72317f28f966fcfe3fbef99dbe2ec2eb14fb5f4aa7df82cb3bce
-
SSDEEP
3072:8ZhZbEXfZ0bN9Na7G8T9lOcBYdRsGqB0Z/0KcoCE9:8PVI8bNJ8T9lOcqdtqBh
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1736-56-0x00000000001A0000-0x00000000001AD000-memory.dmp upx behavioral1/memory/1736-60-0x00000000001A0000-0x00000000001AD000-memory.dmp upx behavioral1/memory/1736-59-0x00000000001A0000-0x00000000001AD000-memory.dmp upx behavioral1/memory/1736-61-0x00000000001A0000-0x00000000001B0000-memory.dmp upx behavioral1/memory/1736-65-0x00000000001A0000-0x00000000001AD000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1736 1268 rundll32.exe 28 PID 1268 wrote to memory of 1736 1268 rundll32.exe 28 PID 1268 wrote to memory of 1736 1268 rundll32.exe 28 PID 1268 wrote to memory of 1736 1268 rundll32.exe 28 PID 1268 wrote to memory of 1736 1268 rundll32.exe 28 PID 1268 wrote to memory of 1736 1268 rundll32.exe 28 PID 1268 wrote to memory of 1736 1268 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2.dll,#12⤵PID:1736
-