Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/09/2022, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
0ef8306a1e48d5c0e090e689b91d57a7ae86868b1ad689939c4a1465216db637.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ef8306a1e48d5c0e090e689b91d57a7ae86868b1ad689939c4a1465216db637.dll
Resource
win10v2004-20220812-en
General
-
Target
0ef8306a1e48d5c0e090e689b91d57a7ae86868b1ad689939c4a1465216db637.dll
-
Size
33KB
-
MD5
4915bd79866b7f8a24d6a653f12b03c2
-
SHA1
58b6f09ff56ef70704b62b3a13df2d7b280f98f8
-
SHA256
0ef8306a1e48d5c0e090e689b91d57a7ae86868b1ad689939c4a1465216db637
-
SHA512
c380a728c3f6caaa395f3b96b7eb9a017d64d382172da3d0aa8792625938c6a160cff2f98e5b09c4fe733b4d21b892023f6a1cd2df0031de838b65e344ca46b9
-
SSDEEP
768:EtM1jYg7ijQdytMpnBS07HQAWphqDoRVyeUuF:EWjJS1Mpd7HzgkMRVnU8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28 PID 1652 wrote to memory of 1340 1652 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0ef8306a1e48d5c0e090e689b91d57a7ae86868b1ad689939c4a1465216db637.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0ef8306a1e48d5c0e090e689b91d57a7ae86868b1ad689939c4a1465216db637.dll,#12⤵PID:1340
-