Analysis
-
max time kernel
93s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743.dll
Resource
win10v2004-20240226-en
General
-
Target
eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743.dll
-
Size
15KB
-
MD5
03aad2cf835bef96122d12cf5efea7db
-
SHA1
432124ff2ae9c67d0c613b8b5e6017865bcbc7db
-
SHA256
eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743
-
SHA512
d143728caca4ad54cf87eeda811d4e02275a453a1916a8dd6753cd1780e5010325bc4de4149b4ec4908f1ef69968ae7950c886252e0defbd908d5f30b53b585a
-
SSDEEP
384:GyF4aDNep0gyc3ADFnWtl4wHmDAX+sjSAEtI:afINAWD9sdEt
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 8 4124 rundll32.exe 9 4124 rundll32.exe 10 4124 rundll32.exe 14 4124 rundll32.exe 15 4124 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4124 rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 13 raw.githubusercontent.com 14 raw.githubusercontent.com 7 pastebin.com 8 pastebin.com -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3644 wrote to memory of 4124 3644 rundll32.exe 85 PID 3644 wrote to memory of 4124 3644 rundll32.exe 85 PID 3644 wrote to memory of 4124 3644 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743.dll,#12⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\eea61e2d014ab260ee9075579f2662b6862da4cf2d0508b5ac2f5d9444b47743.dll
Filesize65KB
MD5c70a84ed1327bde255433456da06b2ce
SHA1000d3f57d89dbc478ccf17f381ac34501a9718d8
SHA2566b4f666b24e1fd048c96693d63b09d65decbaa82e836f0aa6b334f095fa6397c
SHA512eda417020539bae6d661d38b2a9d3aa7fd3ab48347c40716bddf9d83af2c2f7d9b12f634730c0e69a0117158651fd3b6ac6e631f1185de3b9655ee8ca9567078