Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
0f633ff9847f0bb8ad3ec8d826a493ccc8c71c2bc1affd8b5216f218d1c78ff8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0f633ff9847f0bb8ad3ec8d826a493ccc8c71c2bc1affd8b5216f218d1c78ff8.dll
Resource
win10v2004-20220812-en
General
-
Target
0f633ff9847f0bb8ad3ec8d826a493ccc8c71c2bc1affd8b5216f218d1c78ff8.dll
-
Size
89KB
-
MD5
166fd291a5fe7a4635a8c4f8108debfc
-
SHA1
17e6589b6d6ff4ea50bffa5697ac1830c1cec573
-
SHA256
0f633ff9847f0bb8ad3ec8d826a493ccc8c71c2bc1affd8b5216f218d1c78ff8
-
SHA512
c900f0feba774e8470502bfddb6705367e4cf0a9d9d1fc296cbc57e70656a086694c1e65cb711e706ab5a78f47be87028dd10410dea8c549ef86999fcfa90823
-
SSDEEP
1536:H+5fIRk6/JNxQNak1sM6Sn0hIra74MF6HHXVWjOKgYgTGpFYD27crjrxVH4d:HIQRk6/J/21scndraUMF6HArqTQ8b3Yd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f633ff9847f0bb8ad3ec8d826a493ccc8c71c2bc1affd8b5216f218d1c78ff8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f633ff9847f0bb8ad3ec8d826a493ccc8c71c2bc1affd8b5216f218d1c78ff8.dll,#12⤵PID:1252
-