Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
18/09/2022, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
0e71a4337b0661746853d20a5b2bac98b785e909d1b4f32d805a9eb9ab727b27.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0e71a4337b0661746853d20a5b2bac98b785e909d1b4f32d805a9eb9ab727b27.dll
Resource
win10v2004-20220812-en
General
-
Target
0e71a4337b0661746853d20a5b2bac98b785e909d1b4f32d805a9eb9ab727b27.dll
-
Size
35KB
-
MD5
00dbfa86e08f23db3b58c1ae5cbb3b1b
-
SHA1
ca4ce78800221ea96298efbe827340c108d44403
-
SHA256
0e71a4337b0661746853d20a5b2bac98b785e909d1b4f32d805a9eb9ab727b27
-
SHA512
7cd56835d44d66910025499087ba26a2b92c016e6ccbe9fd52514118a3f0a86552b8b794b268990c664185aef326143c52d326b23dfe4981008c8ef6e9e475af
-
SSDEEP
768:WnWy0L5TXpVQcqxieaSrM/W4uGes7UOFTcJ5hlD8oR3YGXdk:XLtXvQqSrMe/s7UOdcrXlRIGXS
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1232 1196 rundll32.exe 27 PID 1196 wrote to memory of 1232 1196 rundll32.exe 27 PID 1196 wrote to memory of 1232 1196 rundll32.exe 27 PID 1196 wrote to memory of 1232 1196 rundll32.exe 27 PID 1196 wrote to memory of 1232 1196 rundll32.exe 27 PID 1196 wrote to memory of 1232 1196 rundll32.exe 27 PID 1196 wrote to memory of 1232 1196 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e71a4337b0661746853d20a5b2bac98b785e909d1b4f32d805a9eb9ab727b27.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e71a4337b0661746853d20a5b2bac98b785e909d1b4f32d805a9eb9ab727b27.dll,#12⤵PID:1232
-