Analysis
-
max time kernel
40s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 07:33
Static task
static1
Behavioral task
behavioral1
Sample
50ac6ea2be01a3c213c09dfe3a0b8b7cea6a0094e99ea8ab302bfb93b3fca4fa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
50ac6ea2be01a3c213c09dfe3a0b8b7cea6a0094e99ea8ab302bfb93b3fca4fa.dll
Resource
win10v2004-20220812-en
General
-
Target
50ac6ea2be01a3c213c09dfe3a0b8b7cea6a0094e99ea8ab302bfb93b3fca4fa.dll
-
Size
161KB
-
MD5
6b79127d8df0e0c8202c1525db7db53b
-
SHA1
829931c2251cabb70e607c6875a44a68c3d8f3a6
-
SHA256
50ac6ea2be01a3c213c09dfe3a0b8b7cea6a0094e99ea8ab302bfb93b3fca4fa
-
SHA512
8a867458f44ceeeac1648913287cc11ff8c3040c23bb0253e7cc649e4df64779f59c4e463f5b8cf84fb056212a9a71be974fc607d38433fb762ce1f3c751fb0d
-
SSDEEP
3072:tI3kzQiDV5OG9JldbCe3zY9VSYX6BxwgCyQY8Xb8Y+o/a:tastqml8e3c9VJXI7nYnS
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1932 1660 rundll32.exe 27 PID 1660 wrote to memory of 1932 1660 rundll32.exe 27 PID 1660 wrote to memory of 1932 1660 rundll32.exe 27 PID 1660 wrote to memory of 1932 1660 rundll32.exe 27 PID 1660 wrote to memory of 1932 1660 rundll32.exe 27 PID 1660 wrote to memory of 1932 1660 rundll32.exe 27 PID 1660 wrote to memory of 1932 1660 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50ac6ea2be01a3c213c09dfe3a0b8b7cea6a0094e99ea8ab302bfb93b3fca4fa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50ac6ea2be01a3c213c09dfe3a0b8b7cea6a0094e99ea8ab302bfb93b3fca4fa.dll,#12⤵PID:1932
-