Analysis
-
max time kernel
151s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
ee8a56b2898393232774abe5398be604adfa53edd6bb89f5e3e89dc4ce0daa3e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ee8a56b2898393232774abe5398be604adfa53edd6bb89f5e3e89dc4ce0daa3e.dll
Resource
win10v2004-20221111-en
General
-
Target
ee8a56b2898393232774abe5398be604adfa53edd6bb89f5e3e89dc4ce0daa3e.dll
-
Size
72KB
-
MD5
c804338381233b144a149980c6d4b6fa
-
SHA1
80acf0a63be68c9781d60bf50ba62bc9e7c31edb
-
SHA256
ee8a56b2898393232774abe5398be604adfa53edd6bb89f5e3e89dc4ce0daa3e
-
SHA512
5b714514e123be37d6879a524c551c39e047f0b08693d39c81fb6dbe1a89707a6648f66b66649935c762f799a47317912fe4798c0c0921ed9bb41771727c2da1
-
SSDEEP
1536:k92beO2x5A/D/0L/1bLiEDlPiHWrtRXNsw+6HYRTJDZROy:BQ5IDk1uEDBLuw0tPO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4716 4364 rundll32.exe 82 PID 4364 wrote to memory of 4716 4364 rundll32.exe 82 PID 4364 wrote to memory of 4716 4364 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee8a56b2898393232774abe5398be604adfa53edd6bb89f5e3e89dc4ce0daa3e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee8a56b2898393232774abe5398be604adfa53edd6bb89f5e3e89dc4ce0daa3e.dll,#12⤵PID:4716
-