Analysis
-
max time kernel
35s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
11e1b942a1772cd23c1c03654c3addf455d33d97331228f895c8dd0d8a6eaf99.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
11e1b942a1772cd23c1c03654c3addf455d33d97331228f895c8dd0d8a6eaf99.dll
Resource
win10v2004-20220901-en
General
-
Target
11e1b942a1772cd23c1c03654c3addf455d33d97331228f895c8dd0d8a6eaf99.dll
-
Size
54KB
-
MD5
03ac0c13b2914f4050e768a7e2ad55f5
-
SHA1
95fac70775b2c53a849b26583becf19d5a16b194
-
SHA256
11e1b942a1772cd23c1c03654c3addf455d33d97331228f895c8dd0d8a6eaf99
-
SHA512
d2b12e9c26783b6f55f8762f435e5bcd8cbb6c17a5c5887a6c7109c1d51ed1a1ed27ce798af4f215a3b91bcc748dc06a226926de69fc0d4f1cfc92525a949a51
-
SSDEEP
768:1Mg1zMXv1G0gqXDeNge/C3sh6GNcIuzuDcGE3a21mpOZqDnLwTkVwCc+vIEqk:1McCNyqTe7rcIVebYQOcotc+vIEj
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 364 wrote to memory of 1620 364 rundll32.exe 26 PID 364 wrote to memory of 1620 364 rundll32.exe 26 PID 364 wrote to memory of 1620 364 rundll32.exe 26 PID 364 wrote to memory of 1620 364 rundll32.exe 26 PID 364 wrote to memory of 1620 364 rundll32.exe 26 PID 364 wrote to memory of 1620 364 rundll32.exe 26 PID 364 wrote to memory of 1620 364 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11e1b942a1772cd23c1c03654c3addf455d33d97331228f895c8dd0d8a6eaf99.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11e1b942a1772cd23c1c03654c3addf455d33d97331228f895c8dd0d8a6eaf99.dll,#12⤵PID:1620
-