Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2.dll
Resource
win10v2004-20220812-en
General
-
Target
ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2.dll
-
Size
208KB
-
MD5
099e73bd7633662bff63cc19f0e14090
-
SHA1
87f3056b2942d5f9ee05190ca41a3b711ea0bab8
-
SHA256
ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2
-
SHA512
1095ecc50aee49e0915475cad1349477ef322718a5c8692bcd8b9ecec79df49a632e34ea6abe72317f28f966fcfe3fbef99dbe2ec2eb14fb5f4aa7df82cb3bce
-
SSDEEP
3072:8ZhZbEXfZ0bN9Na7G8T9lOcBYdRsGqB0Z/0KcoCE9:8PVI8bNJ8T9lOcqdtqBh
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4128-133-0x0000000000B60000-0x0000000000B6D000-memory.dmp upx behavioral2/memory/4128-136-0x0000000000B60000-0x0000000000B6D000-memory.dmp upx behavioral2/memory/4128-137-0x0000000000B60000-0x0000000000B6D000-memory.dmp upx behavioral2/memory/4128-142-0x0000000000B60000-0x0000000000B6D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1748 wrote to memory of 4128 1748 rundll32.exe 82 PID 1748 wrote to memory of 4128 1748 rundll32.exe 82 PID 1748 wrote to memory of 4128 1748 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebb4667d58082c5da5d564c90b1c3765469609152e75bdcc89b1a33e812eaac2.dll,#12⤵PID:4128
-