Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2023 08:21
Static task
static1
Behavioral task
behavioral1
Sample
eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a.dll
Resource
win10v2004-20230915-en
General
-
Target
eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a.dll
-
Size
9.7MB
-
MD5
60f3272a637d751f03ffdacbb4f46372
-
SHA1
6a42558315e3c21ffda16667e9b3f5255516a3a1
-
SHA256
eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a
-
SHA512
5a4dfacde70bda395432ac045102cb71d6b64621d1ec4b6fd2769992037c735e853dacd9f901afdba201d66bf94f51063e2ddae8d63985b487330b46d892bae1
-
SSDEEP
98304:2uffYu2uUfBVh3CPhlz8QV8QkTbyvuyyPUgLrcjiIT1gOSgO8:JkCPhF8QV8QkTbyvuyyPUgn/IGHgO
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4196 wrote to memory of 2848 4196 rundll32.exe 84 PID 4196 wrote to memory of 2848 4196 rundll32.exe 84 PID 4196 wrote to memory of 2848 4196 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eda315e53fe9ee4c48ccc137e65f41332bb8c62c789bdf8a9b24e5bf1c588d4a.dll,#12⤵PID:2848
-