Analysis
-
max time kernel
36s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 09:49
Static task
static1
Behavioral task
behavioral1
Sample
d1d362e80f136c3e23af9f62a08cf49d63ff88409d67b2ce73a20c4a443c4484.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d1d362e80f136c3e23af9f62a08cf49d63ff88409d67b2ce73a20c4a443c4484.dll
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
d1d362e80f136c3e23af9f62a08cf49d63ff88409d67b2ce73a20c4a443c4484.dll
-
Size
58KB
-
MD5
7a03b98639ab6518b3cc66dd82654680
-
SHA1
3af935efd96196ddcba1a2b4dee6366df12194ef
-
SHA256
d1d362e80f136c3e23af9f62a08cf49d63ff88409d67b2ce73a20c4a443c4484
-
SHA512
a615d4985591c0792b20d3aa1598a68be0ed3336d235d8da720f72a84c104ba981199e8918f5285573eef126ccc79e777aa474be33395c192f0aa0a43ce01f94
-
SSDEEP
1536:Osr0FK3YEwRGnZYONwyhTa8Rbp0RmmNkA7Zdnk:Tr0WRVN3e8CRRk
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26 PID 1452 wrote to memory of 532 1452 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d1d362e80f136c3e23af9f62a08cf49d63ff88409d67b2ce73a20c4a443c4484.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d1d362e80f136c3e23af9f62a08cf49d63ff88409d67b2ce73a20c4a443c4484.dll,#12⤵PID:532
-