Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
9710ea3691648aaedc5f2c753e544f84c9721bd10798742e1d663e4286c09b53.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9710ea3691648aaedc5f2c753e544f84c9721bd10798742e1d663e4286c09b53.dll
Resource
win10v2004-20220812-en
General
-
Target
9710ea3691648aaedc5f2c753e544f84c9721bd10798742e1d663e4286c09b53.dll
-
Size
5KB
-
MD5
09738a9a9e102e2456b96dae33864c58
-
SHA1
26ab390b23452d548ab60f99e93c3766c960a1e1
-
SHA256
9710ea3691648aaedc5f2c753e544f84c9721bd10798742e1d663e4286c09b53
-
SHA512
89250b67cd1f8428df102779ece96a4b6b6c488324b5edc888853d3681451ba74ea39ec61a7fd248525b74a8a531b29bbb53727e1403fd1cbcb79d53a70ac897
-
SSDEEP
48:a5zjMTGcITBVQVE1lcYT2/aHrR/W6EjWQ8kpu+j3jpW4eEnusiBPEvwcY719IDpu:iT3Qu8Yi/atORG+jEbEnu/PEoaDLtK
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1160 1292 rundll32.exe 27 PID 1292 wrote to memory of 1160 1292 rundll32.exe 27 PID 1292 wrote to memory of 1160 1292 rundll32.exe 27 PID 1292 wrote to memory of 1160 1292 rundll32.exe 27 PID 1292 wrote to memory of 1160 1292 rundll32.exe 27 PID 1292 wrote to memory of 1160 1292 rundll32.exe 27 PID 1292 wrote to memory of 1160 1292 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9710ea3691648aaedc5f2c753e544f84c9721bd10798742e1d663e4286c09b53.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9710ea3691648aaedc5f2c753e544f84c9721bd10798742e1d663e4286c09b53.dll,#12⤵PID:1160
-