Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-04-2022 18:18
Static task
static1
Behavioral task
behavioral1
Sample
21cf9b71a71a3967966955487bb3960a03ffc484c35d0e71bfe05b798f71d583.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
21cf9b71a71a3967966955487bb3960a03ffc484c35d0e71bfe05b798f71d583.dll
-
Size
260KB
-
MD5
0ba4815496bcd69f62c69cb564ad8aeb
-
SHA1
54538f577d786aaa2cdbd00cc49f74bcd4c34d76
-
SHA256
21cf9b71a71a3967966955487bb3960a03ffc484c35d0e71bfe05b798f71d583
-
SHA512
5f8f4c27a6466f6c88b10d22bf0945053d84778eae852172e592a04a04df27a2a35a61f2cdd4048240153d1de2fd38adb46c6faff0dfbdc10211bd0e510ed098
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1900 wrote to memory of 1096 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1096 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1096 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1096 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1096 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1096 1900 rundll32.exe rundll32.exe PID 1900 wrote to memory of 1096 1900 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21cf9b71a71a3967966955487bb3960a03ffc484c35d0e71bfe05b798f71d583.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21cf9b71a71a3967966955487bb3960a03ffc484c35d0e71bfe05b798f71d583.dll,#12⤵PID:1096