Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-09-2022 18:00
Static task
static1
Behavioral task
behavioral1
Sample
b2ae93d30c8beb0b26f03d4a8325ac89b92a299e8f853e5caa51bb32575b06c6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2ae93d30c8beb0b26f03d4a8325ac89b92a299e8f853e5caa51bb32575b06c6.dll
Resource
win10v2004-20220812-en
General
-
Target
b2ae93d30c8beb0b26f03d4a8325ac89b92a299e8f853e5caa51bb32575b06c6.dll
-
Size
668KB
-
MD5
15b61e4a910c172b25fb7d8ccb92f754
-
SHA1
5d9e319c7d47eb6d31aaed27707fe27a1665031c
-
SHA256
b2ae93d30c8beb0b26f03d4a8325ac89b92a299e8f853e5caa51bb32575b06c6
-
SHA512
7c1c982a2b597b665f45024a42e343a0a07a6167f77ee428a203f23be94b5f225e22a270d1a41b655f3173369f27991770722d765774627229b6b1bbe2a6dc3f
-
SSDEEP
12288:0oUg2twzqWC4kBNv1pMByWk6TYnhCevOEH07OqHM65BaFBuY3NUNeCLIV/Rqnhab:0oUg2tJWC44WUuY3mMCLA/R+hw
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1388 wrote to memory of 1536 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 1536 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 1536 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 1536 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 1536 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 1536 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 1536 1388 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2ae93d30c8beb0b26f03d4a8325ac89b92a299e8f853e5caa51bb32575b06c6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2ae93d30c8beb0b26f03d4a8325ac89b92a299e8f853e5caa51bb32575b06c6.dll,#12⤵PID:1536
-