Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
d12a370691b6d190dac69449758ce4764a486e1d5a3e4fab3aad20109e01e04d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d12a370691b6d190dac69449758ce4764a486e1d5a3e4fab3aad20109e01e04d.dll
Resource
win10v2004-20220901-en
General
-
Target
d12a370691b6d190dac69449758ce4764a486e1d5a3e4fab3aad20109e01e04d.dll
-
Size
59KB
-
MD5
65509c1747bd1367fd85de7548fc6428
-
SHA1
a935497eafb8903beedee30bbf9d0b7691ce4a77
-
SHA256
d12a370691b6d190dac69449758ce4764a486e1d5a3e4fab3aad20109e01e04d
-
SHA512
6d759bc7afeed9d9914be3b3c26718acff26c6a22b7f2d3a7a56c77e2af38d145154d08f68dc39d42273cb9632641b153dfcf27fda19986406b08e87f6f8adae
-
SSDEEP
384:GSTc6nRuiihW0IvBIqyrBzSFeRlW19t+RdaZxKMZk1R+JXLIlr:GSo6n8X2BIq8zSFe3O9cazKGkbsX0lr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d12a370691b6d190dac69449758ce4764a486e1d5a3e4fab3aad20109e01e04d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d12a370691b6d190dac69449758ce4764a486e1d5a3e4fab3aad20109e01e04d.dll,#12⤵PID:1644
-