Analysis
-
max time kernel
21s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
639d93a3c2d90a87c99c4ae51c9f87230ff006d6b490fc78b47b4741771341f9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
639d93a3c2d90a87c99c4ae51c9f87230ff006d6b490fc78b47b4741771341f9.dll
Resource
win10v2004-20220812-en
General
-
Target
639d93a3c2d90a87c99c4ae51c9f87230ff006d6b490fc78b47b4741771341f9.dll
-
Size
6KB
-
MD5
0cb3882a27c8bc12869ec39c9f1c4838
-
SHA1
c5dc343eb005d00b1a67faaa4fb1fab13dddd0d3
-
SHA256
639d93a3c2d90a87c99c4ae51c9f87230ff006d6b490fc78b47b4741771341f9
-
SHA512
f4ce5ea7de4729fbc54ba5be03079407b36e4d04cca8e2020699a9552d6085aecdaed8772bb607a028b336e4199cc959921351e2303dc1b46c8eb0408e062d91
-
SSDEEP
96:v775vP0CyjzYUCztGFhGqheMcMrxuY19An41kQueok5PCRTJoDG43mR:v7VDynosiqCMoV417r5PC0DG2Q
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27 PID 2040 wrote to memory of 884 2040 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\639d93a3c2d90a87c99c4ae51c9f87230ff006d6b490fc78b47b4741771341f9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\639d93a3c2d90a87c99c4ae51c9f87230ff006d6b490fc78b47b4741771341f9.dll,#12⤵PID:884
-