Analysis
-
max time kernel
36s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 19:53
Static task
static1
Behavioral task
behavioral1
Sample
f018c0b9f2996c95b2c8c759a8aba7cc1ec667ba74af22ee147fb11b73f9c6fe.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f018c0b9f2996c95b2c8c759a8aba7cc1ec667ba74af22ee147fb11b73f9c6fe.dll
Resource
win10v2004-20220901-en
General
-
Target
f018c0b9f2996c95b2c8c759a8aba7cc1ec667ba74af22ee147fb11b73f9c6fe.dll
-
Size
39KB
-
MD5
3e99f7beaea7cd9fc6c1461bea8cdcf3
-
SHA1
34fcb0d87045ab5e527e5ef39091d8fa45ab1f1e
-
SHA256
f018c0b9f2996c95b2c8c759a8aba7cc1ec667ba74af22ee147fb11b73f9c6fe
-
SHA512
4a807633a462a14f61ed4beca51f9985ca71ae595ba3454f1ebf6c7d63723e1f61fcfde26d2ad08631c195b9c310ee8cb1f1090d1dffbad0508a3452fcaacbd0
-
SSDEEP
768:ENxoW5V7a3IutzY8DZlOv5gboENpz8qSPzO2PazFB8O6:ENKU+z3GkoY1pSPzY8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1400 1404 rundll32.exe 26 PID 1404 wrote to memory of 1400 1404 rundll32.exe 26 PID 1404 wrote to memory of 1400 1404 rundll32.exe 26 PID 1404 wrote to memory of 1400 1404 rundll32.exe 26 PID 1404 wrote to memory of 1400 1404 rundll32.exe 26 PID 1404 wrote to memory of 1400 1404 rundll32.exe 26 PID 1404 wrote to memory of 1400 1404 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f018c0b9f2996c95b2c8c759a8aba7cc1ec667ba74af22ee147fb11b73f9c6fe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f018c0b9f2996c95b2c8c759a8aba7cc1ec667ba74af22ee147fb11b73f9c6fe.dll,#12⤵PID:1400
-