Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 09:30
Behavioral task
behavioral1
Sample
79b8d46fa00e5d8b5b32f4f1b6437809650558f7402a58b85229249675dc4158.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
79b8d46fa00e5d8b5b32f4f1b6437809650558f7402a58b85229249675dc4158.dll
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
79b8d46fa00e5d8b5b32f4f1b6437809650558f7402a58b85229249675dc4158.dll
-
Size
102KB
-
MD5
62f08a92360d3946bd3798def861b33f
-
SHA1
01d5a6328d7c1d8636dc9b161e914a61af0c52f4
-
SHA256
79b8d46fa00e5d8b5b32f4f1b6437809650558f7402a58b85229249675dc4158
-
SHA512
bcd96adf9341c4bd2d91e2e220d6a4518e3de16dfb4588025e19f7860ce9e792112b980f1d0ea812c8f19fa075a70678f0d199cc6df4e7d4a18a0c053732a3f6
-
SSDEEP
1536:0pstl9F0gv/r7r2ZC3OoulNf8cfN3/OrdwDflmpXyFlw2Vi8avDkWR:0OtFNv/r7r0C3OouzZGdK0xyPwHR
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28 PID 1916 wrote to memory of 1376 1916 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\79b8d46fa00e5d8b5b32f4f1b6437809650558f7402a58b85229249675dc4158.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\79b8d46fa00e5d8b5b32f4f1b6437809650558f7402a58b85229249675dc4158.dll,#12⤵PID:1376
-